Linode status is Operational

Tue 5
Wed 6
Thu 7
Fri 8
Sat 9
Sun 10
Mon 11
now

Linode.com

Tue 5
Wed 6
Thu 7
Fri 8
Sat 9
Sun 10
Mon 11
now

Linode Manager and API

Tue 5
Wed 6
Thu 7
Fri 8
Sat 9
Sun 10
Mon 11
now

Linode Hosted DNS Service

Tue 5
Wed 6
Thu 7
Fri 8
Sat 9
Sun 10
Mon 11
now

Linode Longview

Tue 5
Wed 6
Thu 7
Fri 8
Sat 9
Sun 10
Mon 11
now

Linode Managed Databases

Tue 5
Wed 6
Thu 7
Fri 8
Sat 9
Sun 10
Mon 11
now

Linode ACLP Logs

Tue 5
Wed 6
Thu 7
Fri 8
Sat 9
Sun 10
Mon 11
now
US-East (Newark)
Tue 5
Wed 6
Thu 7
Fri 8
Sat 9
Sun 10
Mon 11
now
Last updated 1 minute ago from official status page. Learn more

You're checking on Linode - but is your own site converting?

Outages aren't the only thing that costs you visitors. Get a visual audit that shows exactly where your site loses conversions. Free, takes 2 minutes.

Audit Your Website Free →

Active Incidents

[DirtyFrag] Linux Privilege Escalation Vulnerability
Started 8 May 2026 13:40:34 (4 days ago), still ongoing
Incident without Impact
Investigating
US-East (Newark)
Linode.com
US-East (Newark) Block Storage
US-East (Newark) NodeBalancers
US-East (Newark) Backups
More...

Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

[1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

Recently Resolved Incidents

(Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
Minor Incident
Resolved
US-East (Newark)
US-East (Newark) Block Storage
US-East (Newark) NodeBalancers
US-East (Newark) Backups
US-East (Newark) Object Storage
More...

Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

[1] https://www.akamai.com/legal/security

Linode Outage Survival Guide

A step-by-step guide to help you survive a Linode outage
NaN%

    Linode Components

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now

    Linode.com

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    Linode Manager and API

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    Linode Hosted DNS Service

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    Linode Longview

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    Linode Managed Databases

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    Linode ACLP Logs

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    Linode Metadata Service

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now

    Linode Regions

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    US-East (Newark)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-Central (Dallas)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-West (Fremont)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-Southeast (Atlanta)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-IAD (Washington)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-ORD (Chicago)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    CA-Central (Toronto)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    EU-West (London)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    EU-Central (Frankfurt)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    FR-PAR (Paris)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-South (Singapore)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-Northeast-2 (Tokyo 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-West (Mumbai)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-Southeast (Sydney)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SE-STO (Stockholm)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-SEA (Seattle)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IT-MIL (Milan)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-OSA (Osaka)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-MAA (Chennai)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ID-CGK (Jakarta)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    BR-GRU (São Paulo)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    NL-AMS (Amsterdam)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-MIA (Miami)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-LAX (Los Angeles)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ES-MAD (Madrid)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AU-MEL (Melbourne)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    GB-LON (London 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-BOM-2 (Mumbai 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SG-SIN-2 (Singapore 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    DE-FRA-2 (Frankfurt 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-TYO-3 (Tokyo 3)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ZA-JNB (Johannesburg)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    NZ-AKL (Auckland)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    CO-BOG (Bogota)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-DEN (Denver)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    DE-HAM (Hamburg)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-HOU (Houston)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    MY-KUL (Kuala Lumpur)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    FR-MRS (Marseille)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    MX-QRO (Queretaro)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    CL-SCL (Santiago)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    FR-PAR-2 (Paris 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-IAD-2 (Washington 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    Linode Backups

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    US-East (Newark) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-Central (Dallas) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-West (Fremont) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-Southeast (Atlanta) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-IAD (Washington) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-ORD (Chicago) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    CA-Central (Toronto) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    EU-West (London) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    EU-Central (Frankfurt) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    FR-PAR (Paris) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-South (Singapore) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-Northeast-2 (Tokyo 2) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-West (Mumbai) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-Southeast (Sydney) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SE-STO (Stockholm) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-SEA (Seattle) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-OSA (Osaka) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-MAA (Chennai) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    BR-GRU (São Paulo) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    NL-AMS (Amsterdam) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ES-MAD (Madrid) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IT-MIL (Milan) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-MIA (Miami) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ID-CGK (Jakarta) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-LAX (Los Angeles) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    GB-LON (London 2) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AU-MEL (Melbourne) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-BOM-2 (Mumbai 2) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    DE-FRA-2 (Frankfurt 2) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SG-SIN-2 (Singapore 2) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-TYO-3 (Tokyo) Backups
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    Linode Block Storage

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    US-East (Newark) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-Central (Dallas) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-West (Fremont) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-Southeast (Atlanta) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-IAD (Washington) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-ORD (Chicago) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    CA-Central (Toronto) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    EU-West (London) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    EU-Central (Frankfurt) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    FR-PAR (Paris) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-South (Singapore) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-Northeast-2 (Tokyo 2) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-West (Mumbai) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-Southeast (Sydney) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SE-STO (Stockholm) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-SEA (Seattle) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-OSA (Osaka) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-MAA (Chennai) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    BR-GRU (São Paulo) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    NL-AMS (Amsterdam) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ES-MAD (Madrid) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IT-MIL (Milan) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-MIA (Miami) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ID-CGK (Jakarta) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-LAX (Los Angeles) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    GB-LON (London 2) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AU-MEL (Melbourne) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-BOM-2 (Mumbai 2) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    DE-FRA-2 (Frankfurt 2) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SG-SIN-2 (Singapore 2) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-TYO-3 (Tokyo 3) Block Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    Linode NodeBalancers

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    US-East (Newark) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-Central (Dallas) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-West (Fremont) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-Southeast (Atlanta) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-IAD (Washington) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-ORD (Chicago) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    CA-Central (Toronto) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    EU-West (London) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    EU-Central (Frankfurt) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    FR-PAR (Paris) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-South (Singapore) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-Northeast-2 (Tokyo 2) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-West (Mumbai) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-Southeast (Sydney) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SE-STO (Stockholm) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-SEA (Seattle) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-OSA (Osaka) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-MAA (Chennai) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    BR-GRU (São Paulo) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    NL-AMS (Amsterdam) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ES-MAD (Madrid) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IT-MIL (Milan) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-MIA (Miami) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ID-CGK (Jakarta) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-LAX (Los Angeles) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    GB-LON (London 2) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AU-MEL (Melbourne) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-BOM-2 (Mumbai 2) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    DE-FRA-2 (Frankfurt 2) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SG-SIN-2 (Singapore 2) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-TYO-3 (Tokyo 3) NodeBalancers
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    Linode Object Storage

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    US-East (Newark) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-Southeast (Atlanta) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-IAD (Washington) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-West (Mumbai)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    US-ORD (Chicago) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    EU-West (London)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    EU-Central (Frankfurt) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-South (Singapore) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    FR-PAR (Paris) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SE-STO (Stockholm) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-SEA (Seattle) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-OSA (Osaka) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-MAA (Chennai) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ID-CGK (Jakarta) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    BR-GRU (Sao Paulo) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ES-MAD (Madrid) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    GB-LON (London 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AU-MEL (Melbourne)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    NL-AMS (Amsterdam) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IT-MIL (Milan) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-MIA (Miami) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-LAX (Los Angeles) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    GB-LON (London 2) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AU-MEL (Melbourne) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-BOM-2 (Mumbai 2) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    DE-FRA-2 (Frankfurt 2) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SG-SIN-2 (Singapore 2) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-TYO-3 (Tokyo 3) Object Storage
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    Linode Kubernetes Engine

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    US-East (Newark) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-Central (Dallas) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-West (Fremont) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-Southeast (Atlanta) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-IAD (Washington) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-ORD (Chicago) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    CA-Central (Toronto) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    EU-West (London) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    EU-Central (Frankfurt) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    FR-PAR (Paris) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-South (Singapore) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-Northeast (Tokyo 2) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-West (Mumbai) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AP-Southeast (Sydney) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SE-STO (Stockholm) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-SEA (Seattle) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-OSA (Osaka) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-MAA (Chennai) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ID-CGK (Jakarta) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    BR-GRU (São Paulo) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    NL-AMS (Amsterdam) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    ES-MAD (Madrid) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IT-MIL (Milan) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-MIA (Miami) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    US-LAX (Los Angeles) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    GB-LON (London 2) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    AU-MEL (Melbourne) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    IN-BOM-2 (Mumbai 2) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    DE-FRA-2 (Frankfurt 2) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    SG-SIN-2 (Singapore 2) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    JP-TYO-3 (Tokyo 3) Linode Kubernetes Engine
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    (Copy Fail) Linux Kernel Local Privilege Escalation Vulnerability [CVE-2026-31431]
    Started 1 May 2026 17:51:06 (11 days ago), resolved 5 May 2026 22:19:10 (7 days ago)
    Minor Incident
    Resolved
    US-East (Newark)
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    US-East (Newark) Object Storage
    More...

    Akamai is aware of the recently disclosed “Copy Fail” vulnerability (CVE-2026-31431). We are assessing the issue and are working to address it across our product portfolio and internal systems. While we have not observed any related malicious exploits targeting our infrastructure, Akamai continuously works to reduce risks and enhance our security posture. We are taking both immediate and longer-term steps to mitigate potential impacts and help ensure the continued confidence of our customers.

    Per our Shared Security Model[1], customers are responsible for making sure their service’s installed applications and code are securely configured and patched. Given the nature of this vulnerability, it should be assumed that all virtual machines running Linux are at-risk until patched. We will be publishing more details as patches are incorporated into the base images that we supply, but we strongly recommend customers deploy mitigations on all instances. Furthermore, the nature of the vulnerability suggests that container escapes are possible, so customers allowing untrusted workloads to execute in their containers may need to take additional steps to secure their containerized workloads.

    We will provide further information regarding our posture and recommended actions for Akamai Compute customers who may be affected.

    [1] https://www.akamai.com/legal/security

    Linode Metadata Service

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    US-East (Newark)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    US-Central (Dallas)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    US-West (Fremont)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    US-Southeast (Atlanta)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    US-IAD (Washington)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    US-ORD (Chicago)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    CA-Central (Toronto)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    EU-West (London)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    EU-Central (Frankfurt)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    FR-PAR (Paris)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    AP-South (Singapore)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    AP-Northeast-2 (Tokyo 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    AP-West (Mumbai)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    AP-Southeast (Sydney)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    SE-STO (Stockholm)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    US-SEA (Seattle)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    IT-MIL (Milan)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    JP-OSA (Osaka)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    IN-MAA (Chennai)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    ID-CGK (Jakarta)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    BR-GRU (São Paulo)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    NL-AMS (Amsterdam)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    US-MIA (Miami)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    US-LAX (Los Angeles)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    ES-MAD (Madrid)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    AU-MEL (Melbourne)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    GB-LON (London 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    IN-BOM-2 (Mumbai 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    SG-SIN-2 (Singapore 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    DE-FRA-2 (Frankfurt 2)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    JP-TYO-3 (Tokyo 3)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    ZA-JNB (Johannesburg)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    NZ-AKL (Auckland)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    CO-BOG (Bogota)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    US-DEN (Denver)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    DE-HAM (Hamburg)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    US-HOU (Houston)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    MY-KUL (Kuala Lumpur)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    FR-MRS (Marseille)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    MX-QRO (Queretaro)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    Linode ACLP Logs

    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    US-LAX (Los Angeles) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    CL-SCL (Santiago)
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    [DirtyFrag] Linux Privilege Escalation Vulnerability
    Started 8 May 2026 13:40:34 (4 days ago), still ongoing
    Incident without Impact
    Investigating
    US-East (Newark)
    Linode.com
    US-East (Newark) Block Storage
    US-East (Newark) NodeBalancers
    US-East (Newark) Backups
    More...

    Akamai is aware of the recently disclosed “DirtyFrag”[1] vulnerability that followed the “CopyFail”[2] disclosure. This vulnerability is very similar in nature and has a similar impact, exploit path, and mitigation approach. We have not observed any related malicious exploits targeting our infrastructure and are continuing to address the vulnerability across our product portfolio and internal systems.

    As with “CopyFail”, we are advising customers to consider most Linux distributions to be at-risk until patched. Since the “DirtyFrag” vulnerability was disclosed prior to upstream patches having been made available, we are forced to wait for the different OS providers to create new releases or patches before we can integrate them into the versions we make available to customers.

    As this is a rapidly developing incident, we will provide further information regarding recommended actions, possible mitigations, and OS updates for all customers who may be affected.

    [1] https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md [2] https://www.linode.com/docs/guides/cve-2026-31431-copy-fail-mitigation/

    US-ORD (Chicago) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    NO-OSL (Oslo) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    US-IAD (Washington) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    US-SEA (Seattle) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    EU-Central (Frankfurt) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    EU-West (London) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    FR-PAR (Paris) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    AP-West (Mumbai) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    SG-SIN-2 (Singapore 2) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    JP-TYO-3 (Tokyo 3) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    AU-MEL (Melbourne) ACLP Logs
    Tue 5
    Wed 6
    Thu 7
    Fri 8
    Sat 9
    Sun 10
    Mon 11
    now
    Stay ahead of Linode outages
    Sign up to create a custom dashboard to monitor the services you rely on. 3,000+ services supported.