Welcome to Gentoo, a highly flexible, source-based Linux distribution.

Copy Fail, Dirty Frag, and Fragnesia kernel vulnerabilities (May 19, 2026)

Fragnesia logo

The Linux kernel has recently been facing a series of discovered privilege escalation vulnerabilities, starting with the Copy Fail vulnerability and followed by subsequent vulnerabilities in the same spirit (Dirty Frag, Fragnesia). This development is part of a general trend where vulnerabilities are being found - and disclosed - faster than before. We expect it to continue, at least for the short-term.

The Gentoo Linux Kernel and Distribution Kernel teams are doing their best to keep Gentoo kernels secure. This includes both packaging the latest upstream releases as soon as possible, and backporting additional vulnerability fixes or mitigations whenever they become available. As example, while upstream kernel releases are still vulnerable to Fragnesia, the respective Gentoo kernels feature fixes from day one. At the time of writing, all supported Gentoo kernels feature the latest Fragnesia v5 patch. Please expect more updates. We recommend exploring ways to automate upgrading your kernel.

Please note that only sys-kernel/gentoo-kernel, sys-kernel/gentoo-kernel-bin and sys-kernel/gentoo-sources packages are security-supported. The vanilla kernel packages are vulnerable at the moment. Other kernel packages may carry fixes, but they usually are slower to be updated. Additionally, we recommend running the latest kernel version (~arch or latest stable LTS), as upstream does not reliably backport security fixes to older versions.

The Gentoo Big Forum Upgrade (Apr 2, 2026)

Gentoo Forums header

It’s taken a lot of time, but we have finally made the big step to upgrade our Gentoo Forums to phpBB3. You will notice a few differences between phpBB2 and today:

  • It’s definitely not Discourse.
  • Everyone must change their password at first login, just to freshen them up.
  • Reports are more private-like now, but we may get the old public reporting topic back later.

Discussion and feedback are welcome on the ‘The Gentoo Big Forum Upgrade’ discussion thread.

Security advisories from our Security database

GLSA 202604-04 DTrace: Arbitrary file creation via dtprobed normal
GLSA 202604-03 FUSE: Multiple Vulnerabilities normal
GLSA 202603-01 Exiv2: Multiple Vulnerabilities low
GLSA 202601-05 Commons-BeanUtils: Arbitary Code Execution high
GLSA 202601-04 Asterisk: Multiple Vulnerabilities high

New packages at the Gentoo packages database

app-misc/consoleet-utils Set of utilities for manipulating terminal fonts and colors
dev-python/requests-ratelimiter Rate-limiting for the requests library
media-video/srs Simple Realtime media Server
app-admin/openvox OpenVox agent and apply tools for Puppet-compatible configuration management
dev-ruby/scanf Ruby implementation of the C function scanf(3)

Fresh documentation on the Gentoo wiki

GCC/git bisect started by Gso321
Su/de started by AbberrantConsist
/etc/portage/package.mask/de started by AbberrantConsist
IRC/it started by Fra.sa
Containerd started by Denis