<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>СloudLinux Blog</title>
    <link>https://blog.cloudlinux.com</link>
    <description />
    <language>en</language>
    <pubDate>Sun, 10 May 2026 08:32:45 GMT</pubDate>
    <dc:date>2026-05-10T08:32:45Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Dirty Frag (CVE-2026-43284, CVE-2026-43500): Mitigation and Kernel Update on CloudLinux</title>
      <link>https://blog.cloudlinux.com/dirty-frag-mitigation-and-kernel-update</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/dirty-frag-mitigation-and-kernel-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/blog-images/cloudlinux/dirtyfrag-featured.png" alt="Dirty Frag: Mitigation and Kernel Update on CloudLinux blog featured image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privilege escalation in the same broad area — IPsec ESP and rxrpc — and named it &lt;span style="font-weight: bold;"&gt;Dirty Frag&lt;/span&gt;. A working public proof-of-concept exists; any unprivileged local user can use it to gain root in a single command.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/dirty-frag-mitigation-and-kernel-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/blog-images/cloudlinux/dirtyfrag-featured.png" alt="Dirty Frag: Mitigation and Kernel Update on CloudLinux blog featured image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privilege escalation in the same broad area — IPsec ESP and rxrpc — and named it &lt;span style="font-weight: bold;"&gt;Dirty Frag&lt;/span&gt;. A working public proof-of-concept exists; any unprivileged local user can use it to gain root in a single command.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5408110&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cloudlinux.com%2Fdirty-frag-mitigation-and-kernel-update&amp;amp;bu=https%253A%252F%252Fblog.cloudlinux.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>KernelCare</category>
      <category>CVE</category>
      <category>Vulnerability</category>
      <category>Kernel Update</category>
      <category>AlmaLinux</category>
      <category>CloudLinux</category>
      <pubDate>Thu, 07 May 2026 21:19:23 GMT</pubDate>
      <guid>https://blog.cloudlinux.com/dirty-frag-mitigation-and-kernel-update</guid>
      <dc:date>2026-05-07T21:19:23Z</dc:date>
      <dc:creator>CloudLinux OS team</dc:creator>
    </item>
    <item>
      <title>Copy Fail (CVE-2026-31431): Patching kernels without rebooting</title>
      <link>https://blog.cloudlinux.com/cve-2026-31431-copy-fail-patching-kernels-without-rebooting</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/cve-2026-31431-copy-fail-patching-kernels-without-rebooting" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/blog-images/cloudlinux/cve-2026-31431-copy-fail-followup-featured.png" alt="CVE-2026-31431 (Copy Fail): Patching kernels without rebooting blog featured image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Most kernel CVEs follow a predictable rhythm for hosting providers: read the advisory, schedule a maintenance window, reboot during off-peak. Copy Fail (CVE-2026-31431) breaks that rhythm. It's a deterministic vulnerability, universal across Linux distributions, and lets a single compromised account on a shared host pivot to root over every other account on the same node. CISA added it to the actively-exploited list with a May 15 federal patch deadline. A severe combination for shared hosting: high impact on multi-tenant servers, and a fix that requires a reboot on every box.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/cve-2026-31431-copy-fail-patching-kernels-without-rebooting" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/blog-images/cloudlinux/cve-2026-31431-copy-fail-followup-featured.png" alt="CVE-2026-31431 (Copy Fail): Patching kernels without rebooting blog featured image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Most kernel CVEs follow a predictable rhythm for hosting providers: read the advisory, schedule a maintenance window, reboot during off-peak. Copy Fail (CVE-2026-31431) breaks that rhythm. It's a deterministic vulnerability, universal across Linux distributions, and lets a single compromised account on a shared host pivot to root over every other account on the same node. CISA added it to the actively-exploited list with a May 15 federal patch deadline. A severe combination for shared hosting: high impact on multi-tenant servers, and a fix that requires a reboot on every box.&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5408110&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cloudlinux.com%2Fcve-2026-31431-copy-fail-patching-kernels-without-rebooting&amp;amp;bu=https%253A%252F%252Fblog.cloudlinux.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>KernelCare</category>
      <category>CVE</category>
      <category>Vulnerability</category>
      <category>Live Patching</category>
      <category>Kernel Update</category>
      <pubDate>Wed, 06 May 2026 10:22:34 GMT</pubDate>
      <guid>https://blog.cloudlinux.com/cve-2026-31431-copy-fail-patching-kernels-without-rebooting</guid>
      <dc:date>2026-05-06T10:22:34Z</dc:date>
      <dc:creator>CloudLinux OS team</dc:creator>
    </item>
    <item>
      <title>An Update on CloudLinux's Partnership with Seahawk</title>
      <link>https://blog.cloudlinux.com/an-update-on-cloudlinuxs-partnership-with-seahawk</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/an-update-on-cloudlinuxs-partnership-with-seahawk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/CL-CloudLinuxs%20Partnership%20with%20Seahawk_alt.png" alt="An Update on CloudLinux's Partnership with Seahawk" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;span&gt;We want to give our community an update: CloudLinux has ended its business relationship with Seahawk Global, LLC / Seahawk Media LLC. The termination of the business relationship is not a reflection of the service they provide.&lt;/span&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/an-update-on-cloudlinuxs-partnership-with-seahawk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/CL-CloudLinuxs%20Partnership%20with%20Seahawk_alt.png" alt="An Update on CloudLinux's Partnership with Seahawk" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt; 
&lt;span&gt;We want to give our community an update: CloudLinux has ended its business relationship with Seahawk Global, LLC / Seahawk Media LLC. The termination of the business relationship is not a reflection of the service they provide.&lt;/span&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5408110&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cloudlinux.com%2Fan-update-on-cloudlinuxs-partnership-with-seahawk&amp;amp;bu=https%253A%252F%252Fblog.cloudlinux.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>News</category>
      <category>Marketing Blog</category>
      <category>Advice</category>
      <pubDate>Fri, 01 May 2026 08:42:30 GMT</pubDate>
      <guid>https://blog.cloudlinux.com/an-update-on-cloudlinuxs-partnership-with-seahawk</guid>
      <dc:date>2026-05-01T08:42:30Z</dc:date>
      <dc:creator>CloudLinux OS team</dc:creator>
    </item>
    <item>
      <title>CVE-2026-31431 (Copy Fail): Kernel Update on CloudLinux</title>
      <link>https://blog.cloudlinux.com/cve-2026-31431-copy-fail-kernel-update</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/cve-2026-31431-copy-fail-kernel-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/blog-images/cloudlinux/cve-2026-31431-copy-fail-featured.png" alt="CVE-2026-31431 (Copy Fail): Kernel Update on CloudLinux blog featured image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;CVE-2026-31431 (Copy Fail) is a&amp;nbsp;Linux kernel local privilege escalation vulnerability in the &lt;span style="background-color: #f0f0f0; padding: 2px 6px; border-radius: 3px; font-family: monospace; font-size: 0.9em;"&gt;algif_aead&lt;/span&gt; module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All kernels since 2017 are affected.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/cve-2026-31431-copy-fail-kernel-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/blog-images/cloudlinux/cve-2026-31431-copy-fail-featured.png" alt="CVE-2026-31431 (Copy Fail): Kernel Update on CloudLinux blog featured image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;CVE-2026-31431 (Copy Fail) is a&amp;nbsp;Linux kernel local privilege escalation vulnerability in the &lt;span style="background-color: #f0f0f0; padding: 2px 6px; border-radius: 3px; font-family: monospace; font-size: 0.9em;"&gt;algif_aead&lt;/span&gt; module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All kernels since 2017 are affected.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5408110&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cloudlinux.com%2Fcve-2026-31431-copy-fail-kernel-update&amp;amp;bu=https%253A%252F%252Fblog.cloudlinux.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>KernelCare</category>
      <category>CVE</category>
      <category>Vulnerability</category>
      <category>Kernel Update</category>
      <category>AlmaLinux</category>
      <category>CloudLinux</category>
      <pubDate>Fri, 01 May 2026 07:57:45 GMT</pubDate>
      <guid>https://blog.cloudlinux.com/cve-2026-31431-copy-fail-kernel-update</guid>
      <dc:date>2026-05-01T07:57:45Z</dc:date>
      <dc:creator>CloudLinux OS team</dc:creator>
    </item>
    <item>
      <title>CVE-2026-31431 (Copy Fail): Mitigation and Upcoming Patches for CloudLinux</title>
      <link>https://blog.cloudlinux.com/cve-2026-31431-copy-fail-mitigation-and-patches</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/cve-2026-31431-copy-fail-mitigation-and-patches" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/blog-images/cloudlinux/cve-2026-31431-copy-fail-advisory-featured.png" alt="CVE-2026-31431 (Copy Fail): Mitigation and Upcoming Patches for CloudLinux blog featured image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div style="border-left: 4px solid #ff0000; background-color: #f8533f; padding: 14px 18px; margin: 0 0 24px 0; border-radius: 4px;"&gt; 
 &lt;p style="margin: 0 0 6px 0;"&gt;&lt;strong style="font-weight: bold;"&gt;Update on 2026-05-01&lt;/strong&gt;&lt;/p&gt; 
 &lt;p style="margin: 0;"&gt;A follow-up advisory with full update instructions has been &lt;a href="https://blog.cloudlinux.com/cve-2026-31431-copy-fail-kernel-update"&gt;published here&lt;/a&gt;.&lt;/p&gt; 
&lt;/div&gt; 
&lt;p&gt;CVE-2026-31431 (Copy Fail) is a&amp;nbsp;Linux kernel local privilege escalation in the &lt;span style="background-color: #f0f0f0; padding: 2px 6px; border-radius: 3px; font-family: monospace; font-size: 0.9em;"&gt;algif_aead&lt;/span&gt; module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All Linux kernels since 2017 are affected.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/cve-2026-31431-copy-fail-mitigation-and-patches" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/blog-images/cloudlinux/cve-2026-31431-copy-fail-advisory-featured.png" alt="CVE-2026-31431 (Copy Fail): Mitigation and Upcoming Patches for CloudLinux blog featured image" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div style="border-left: 4px solid #ff0000; background-color: #f8533f; padding: 14px 18px; margin: 0 0 24px 0; border-radius: 4px;"&gt; 
 &lt;p style="margin: 0 0 6px 0;"&gt;&lt;strong style="font-weight: bold;"&gt;Update on 2026-05-01&lt;/strong&gt;&lt;/p&gt; 
 &lt;p style="margin: 0;"&gt;A follow-up advisory with full update instructions has been &lt;a href="https://blog.cloudlinux.com/cve-2026-31431-copy-fail-kernel-update"&gt;published here&lt;/a&gt;.&lt;/p&gt; 
&lt;/div&gt; 
&lt;p&gt;CVE-2026-31431 (Copy Fail) is a&amp;nbsp;Linux kernel local privilege escalation in the &lt;span style="background-color: #f0f0f0; padding: 2px 6px; border-radius: 3px; font-family: monospace; font-size: 0.9em;"&gt;algif_aead&lt;/span&gt; module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All Linux kernels since 2017 are affected.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5408110&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cloudlinux.com%2Fcve-2026-31431-copy-fail-mitigation-and-patches&amp;amp;bu=https%253A%252F%252Fblog.cloudlinux.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>KernelCare</category>
      <category>CVE</category>
      <category>Vulnerability</category>
      <category>Kernel Update</category>
      <category>AlmaLinux</category>
      <category>CloudLinux</category>
      <pubDate>Thu, 30 Apr 2026 16:37:25 GMT</pubDate>
      <guid>https://blog.cloudlinux.com/cve-2026-31431-copy-fail-mitigation-and-patches</guid>
      <dc:date>2026-04-30T16:37:25Z</dc:date>
      <dc:creator>CloudLinux OS team</dc:creator>
    </item>
    <item>
      <title>What's coming at CloudLinux Product Pulse Q2 2026</title>
      <link>https://blog.cloudlinux.com/whats-coming-at-cloudlinux-product-pulse-q2-2026</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/whats-coming-at-cloudlinux-product-pulse-q2-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/Blog-Webinar-ProductPulseQ2.png" alt="What's coming at CloudLinux Product Pulse Q2 2026" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;A lot has shipped since the Q1 edition of CloudLinux Product Pulse. The Q2 session on &lt;/span&gt;&lt;strong&gt;&lt;span&gt;April 29 at 4pm CET / 10am ET &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;covers all of it: what's new, what it means for your hosting operations, and where the product roadmap is heading next&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Here's a preview of the topics we'll cover.&lt;/span&gt;&lt;/p&gt; 
&lt;h3&gt;&lt;span style="color: #434343;"&gt;Cached WordPress pages, 3x faster&lt;/span&gt;&lt;/h3&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/whats-coming-at-cloudlinux-product-pulse-q2-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/Blog-Webinar-ProductPulseQ2.png" alt="What's coming at CloudLinux Product Pulse Q2 2026" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;A lot has shipped since the Q1 edition of CloudLinux Product Pulse. The Q2 session on &lt;/span&gt;&lt;strong&gt;&lt;span&gt;April 29 at 4pm CET / 10am ET &lt;/span&gt;&lt;/strong&gt;&lt;span&gt;covers all of it: what's new, what it means for your hosting operations, and where the product roadmap is heading next&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Here's a preview of the topics we'll cover.&lt;/span&gt;&lt;/p&gt; 
&lt;h3&gt;&lt;span style="color: #434343;"&gt;Cached WordPress pages, 3x faster&lt;/span&gt;&lt;/h3&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5408110&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cloudlinux.com%2Fwhats-coming-at-cloudlinux-product-pulse-q2-2026&amp;amp;bu=https%253A%252F%252Fblog.cloudlinux.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>webinar</category>
      <category>Marketing Blog</category>
      <category>Advice</category>
      <category>WordPress</category>
      <pubDate>Mon, 13 Apr 2026 17:15:00 GMT</pubDate>
      <guid>https://blog.cloudlinux.com/whats-coming-at-cloudlinux-product-pulse-q2-2026</guid>
      <dc:date>2026-04-13T17:15:00Z</dc:date>
      <dc:creator>CloudLinux OS team</dc:creator>
    </item>
    <item>
      <title>CloudLinux GPG Package Signing Key Update for CloudLinux 7, 8, and 9</title>
      <link>https://blog.cloudlinux.com/cloudlinux-gpg-package-signing-key-update</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/cloudlinux-gpg-package-signing-key-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/GPG-Key-Update.png" alt="CloudLinux GPG Package Signing Key Update for CloudLinux 7, 8, and 9" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Starting &lt;strong&gt;May 1, 2026&lt;/strong&gt;, CloudLinux will sign new packages for CloudLinux 7, 8, and 9 exclusively with a new GPG key.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/cloudlinux-gpg-package-signing-key-update" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/GPG-Key-Update.png" alt="CloudLinux GPG Package Signing Key Update for CloudLinux 7, 8, and 9" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Starting &lt;strong&gt;May 1, 2026&lt;/strong&gt;, CloudLinux will sign new packages for CloudLinux 7, 8, and 9 exclusively with a new GPG key.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5408110&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cloudlinux.com%2Fcloudlinux-gpg-package-signing-key-update&amp;amp;bu=https%253A%252F%252Fblog.cloudlinux.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Technical Blog</category>
      <pubDate>Wed, 08 Apr 2026 10:35:14 GMT</pubDate>
      <author>izhmud@cloudlinux.com (Ivan Zhmud)</author>
      <guid>https://blog.cloudlinux.com/cloudlinux-gpg-package-signing-key-update</guid>
      <dc:date>2026-04-08T10:35:14Z</dc:date>
    </item>
    <item>
      <title>CloudLinux Now Supports cgroup v2</title>
      <link>https://blog.cloudlinux.com/cloudlinux-now-supports-cgroup-v2</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/cloudlinux-now-supports-cgroup-v2" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/cgroup-v2-post-header.png" alt="CloudLinux now supports cgroup v2" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;CloudLinux now supports &lt;span style="font-weight: bold;"&gt;cgroup v2&lt;/span&gt; on CloudLinux 8, 9, 10, and Ubuntu 22. New installations of CloudLinux 10 following this release will use cgroup v2 by default. On all other versions, cgroup v1 remains the default, and you can switch to v2 when you're ready.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;From a day-to-day operations standpoint, practically nothing changes. Your LVE limits, control panel interface, and resource monitoring all continue to work the same way.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/cloudlinux-now-supports-cgroup-v2" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/cgroup-v2-post-header.png" alt="CloudLinux now supports cgroup v2" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;CloudLinux now supports &lt;span style="font-weight: bold;"&gt;cgroup v2&lt;/span&gt; on CloudLinux 8, 9, 10, and Ubuntu 22. New installations of CloudLinux 10 following this release will use cgroup v2 by default. On all other versions, cgroup v1 remains the default, and you can switch to v2 when you're ready.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;From a day-to-day operations standpoint, practically nothing changes. Your LVE limits, control panel interface, and resource monitoring all continue to work the same way.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5408110&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cloudlinux.com%2Fcloudlinux-now-supports-cgroup-v2&amp;amp;bu=https%253A%252F%252Fblog.cloudlinux.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>lve</category>
      <category>Technical Blog</category>
      <category>CloudLinux</category>
      <pubDate>Thu, 02 Apr 2026 20:11:42 GMT</pubDate>
      <author>izhmud@cloudlinux.com (Ivan Zhmud)</author>
      <guid>https://blog.cloudlinux.com/cloudlinux-now-supports-cgroup-v2</guid>
      <dc:date>2026-04-02T20:11:42Z</dc:date>
    </item>
    <item>
      <title>MAx Cache Stable Release: 3x Faster WordPress Page Loads on Apache and Nginx</title>
      <link>https://blog.cloudlinux.com/max-cache-stable-release-3x-faster-wordpress-page-loads-on-apache-and-nginx</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/max-cache-stable-release-3x-faster-wordpress-page-loads-on-apache-and-nginx" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/max_cache_stable_release.png" alt="MAx Cache stable release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;MAx Cache is now generally available as part of CloudLinux subscriptions at no additional cost. After testing in beta, both the Apache and Nginx modules are now production-ready.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;MAx Cache is a pair of native web server modules that serve cached WordPress pages directly from Apache or Nginx, without running PHP. Hosting providers deploy it at the server level. Site owners enable it through the AccelerateWP plugin in WordPress. If you followed the beta, the workflow is the same. If you're hearing about MAx Cache for the first time, read on.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/max-cache-stable-release-3x-faster-wordpress-page-loads-on-apache-and-nginx" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/max_cache_stable_release.png" alt="MAx Cache stable release" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;MAx Cache is now generally available as part of CloudLinux subscriptions at no additional cost. After testing in beta, both the Apache and Nginx modules are now production-ready.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;MAx Cache is a pair of native web server modules that serve cached WordPress pages directly from Apache or Nginx, without running PHP. Hosting providers deploy it at the server level. Site owners enable it through the AccelerateWP plugin in WordPress. If you followed the beta, the workflow is the same. If you're hearing about MAx Cache for the first time, read on.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5408110&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cloudlinux.com%2Fmax-cache-stable-release-3x-faster-wordpress-page-loads-on-apache-and-nginx&amp;amp;bu=https%253A%252F%252Fblog.cloudlinux.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Technical Blog</category>
      <category>AccelerateWP</category>
      <category>MAx Cache</category>
      <pubDate>Tue, 24 Mar 2026 07:59:59 GMT</pubDate>
      <author>izhmud@cloudlinux.com (Ivan Zhmud)</author>
      <guid>https://blog.cloudlinux.com/max-cache-stable-release-3x-faster-wordpress-page-loads-on-apache-and-nginx</guid>
      <dc:date>2026-03-24T07:59:59Z</dc:date>
    </item>
    <item>
      <title>Introducing .htaccess Caching in MAx Cache: 20% Faster Apache Page Loads</title>
      <link>https://blog.cloudlinux.com/introducing-htaccess-caching-in-max-cache-20-percent-faster-apache-page-loads</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/introducing-htaccess-caching-in-max-cache-20-percent-faster-apache-page-loads" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/htaccess_caching_in_max_cache.png" alt="Introducing .htaccess caching in MAx Cache" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hosting servers with Apache can now handle 18% more traffic with 20% faster response times, without any configuration changes. Today we're &lt;span style="background-color: transparent;"&gt;announcing the beta release o&lt;/span&gt;&lt;span style="background-color: transparent;"&gt;f &lt;strong&gt;.htaccess cache&lt;/strong&gt;&lt;/span&gt;, a new feature in MAx Cache that compiles .htaccess files into memory, eliminating the per-request disk I/O that slows down every page load on a server.&lt;/p&gt; 
&lt;p&gt;This new feature builds on the &lt;a href="https://blog.cloudlinux.com/introducing-max-cache-beta-apache-module-for-accelerating-wordpress-performance"&gt;MAx Cache for Apache&lt;/a&gt; module we released in December 2025 and the &lt;a href="https://blog.cloudlinux.com/max-cache-now-available-for-nginx-server-level-wordpress-caching-completely-bypassing-php"&gt;MAx Cache for Nginx&lt;/a&gt; module that followed in early 2026. If you already run MAx Cache for Apache, you get .htaccess caching with a single package update. No new packages, no new configuration.&lt;/p&gt; 
&lt;p&gt;This release also adds &lt;strong&gt;CloudLinux 10 support&lt;/strong&gt; across the entire MAx Cache stack: Apache module, Nginx module, and .htaccess caching..&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.cloudlinux.com/introducing-htaccess-caching-in-max-cache-20-percent-faster-apache-page-loads" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.cloudlinux.com/hubfs/htaccess_caching_in_max_cache.png" alt="Introducing .htaccess caching in MAx Cache" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Hosting servers with Apache can now handle 18% more traffic with 20% faster response times, without any configuration changes. Today we're &lt;span style="background-color: transparent;"&gt;announcing the beta release o&lt;/span&gt;&lt;span style="background-color: transparent;"&gt;f &lt;strong&gt;.htaccess cache&lt;/strong&gt;&lt;/span&gt;, a new feature in MAx Cache that compiles .htaccess files into memory, eliminating the per-request disk I/O that slows down every page load on a server.&lt;/p&gt; 
&lt;p&gt;This new feature builds on the &lt;a href="https://blog.cloudlinux.com/introducing-max-cache-beta-apache-module-for-accelerating-wordpress-performance"&gt;MAx Cache for Apache&lt;/a&gt; module we released in December 2025 and the &lt;a href="https://blog.cloudlinux.com/max-cache-now-available-for-nginx-server-level-wordpress-caching-completely-bypassing-php"&gt;MAx Cache for Nginx&lt;/a&gt; module that followed in early 2026. If you already run MAx Cache for Apache, you get .htaccess caching with a single package update. No new packages, no new configuration.&lt;/p&gt; 
&lt;p&gt;This release also adds &lt;strong&gt;CloudLinux 10 support&lt;/strong&gt; across the entire MAx Cache stack: Apache module, Nginx module, and .htaccess caching..&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=5408110&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.cloudlinux.com%2Fintroducing-htaccess-caching-in-max-cache-20-percent-faster-apache-page-loads&amp;amp;bu=https%253A%252F%252Fblog.cloudlinux.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Technical Blog</category>
      <category>AccelerateWP</category>
      <category>MAx Cache</category>
      <pubDate>Thu, 19 Mar 2026 16:15:29 GMT</pubDate>
      <author>izhmud@cloudlinux.com (Ivan Zhmud)</author>
      <guid>https://blog.cloudlinux.com/introducing-htaccess-caching-in-max-cache-20-percent-faster-apache-page-loads</guid>
      <dc:date>2026-03-19T16:15:29Z</dc:date>
    </item>
  </channel>
</rss>
