Inside Our New AI Support Assistant: A 55% CSAT Lift and Customer Feedback to Match

Blog-CL-AISupport

A purpose-built virtual assistant — trained on our own knowledge base — is changing how customers get answers.

Inside Our New AI Support Assistant: A 55% CSAT Lift and Customer Feedback to Match

Blog-CL-AISupport

A purpose-built virtual assistant — trained on our own knowledge base — is changing how customers get answers.

Three root exploits in two weeks: What's your patching strategy?

On April 29, 2026, a Linux kernel privilege escalation called Copy Fail (CVE-2026-31431) became public on the oss-security mailing list. A short Python script, runnable by any unprivileged user, returned a root shell on most enterprise Linux servers running kernels from 2017 onward.

Three root exploits in two weeks: What's your patching strategy?

On April 29, 2026, a Linux kernel privilege escalation called Copy Fail (CVE-2026-31431) became public on the oss-security mailing list. A short Python script, runnable by any unprivileged user, returned a root shell on most enterprise Linux servers running kernels from 2017 onward.

PinTheft (CVE-2026-43494) kernel LPE: CloudLinux platforms are not affected

Researcher Aaron Esau and the V12 Security team disclosed PinTheft, a Linux kernel local privilege escalation that chains an RDS zerocopy reference-count bug with io_uring fixed buffers to overwrite the page cache of a SUID-root binary. A public proof-of-concept is available. Any unprivileged local user on an affected host can use it to gain root.

PinTheft (CVE-2026-43494) kernel LPE: CloudLinux platforms are not affected

Researcher Aaron Esau and the V12 Security team disclosed PinTheft, a Linux kernel local privilege escalation that chains an RDS zerocopy reference-count bug with io_uring fixed buffers to overwrite the page cache of a SUID-root binary. A public proof-of-concept is available. Any unprivileged local user on an affected host can use it to gain root.

How Hosting Providers Are Fixing Their VPS Profitability Problem in 2026

CL-Blog-VPSMargins
VPS is the biggest growth opportunity in hosting right now. According to the
2026 Web Hosting Trends Report, 65% of providers reported revenue growth last year and 26% rank VPS as their top growth category. The demand is there. The customers are signing up.

How Hosting Providers Are Fixing Their VPS Profitability Problem in 2026

CL-Blog-VPSMargins
VPS is the biggest growth opportunity in hosting right now. According to the
2026 Web Hosting Trends Report, 65% of providers reported revenue growth last year and 26% rank VPS as their top growth category. The demand is there. The customers are signing up.

Linux Kernel ptrace Exit-race Vulnerability / ssh-keysign-pwn (CVE-2026-46333) — Mitigation and Kernel Update on CloudLinux

Right after the kernel privilege-escalation chain in the XFRM/ESP subsystem (Copy Fail, Dirty Frag, Fragnesia), Qualys disclosed a different Linux kernel issue. This time in the ptrace access-check path. CVE-2026-46333 is reserved for tracking this vulnerability. A public proof-of-concept exists. An unprivileged local user on an affected host can use it to read root-owned secrets (SSH host private keys and the shadow password database) without obtaining root privileges directly.

Linux Kernel ptrace Exit-race Vulnerability / ssh-keysign-pwn (CVE-2026-46333) — Mitigation and Kernel Update on CloudLinux

Right after the kernel privilege-escalation chain in the XFRM/ESP subsystem (Copy Fail, Dirty Frag, Fragnesia), Qualys disclosed a different Linux kernel issue. This time in the ptrace access-check path. CVE-2026-46333 is reserved for tracking this vulnerability. A public proof-of-concept exists. An unprivileged local user on an affected host can use it to read root-owned secrets (SSH host private keys and the shadow password database) without obtaining root privileges directly.

Fragnesia (CVE-2026-46300) — Mitigation and Kernel Update on CloudLinux

Less than a week after Dirty Frag, researcher William Bowling and the V12 team disclosed a third Linux kernel local privilege escalation in the same broad area (XFRM / ESP) and named it Fragnesia. A working public proof-of-concept exists. Any unprivileged local user can use it to gain root in a single command.

Fragnesia (CVE-2026-46300) — Mitigation and Kernel Update on CloudLinux

Less than a week after Dirty Frag, researcher William Bowling and the V12 team disclosed a third Linux kernel local privilege escalation in the same broad area (XFRM / ESP) and named it Fragnesia. A working public proof-of-concept exists. Any unprivileged local user can use it to gain root in a single command.

Dirty Frag (CVE-2026-43284, CVE-2026-43500): Mitigation and Kernel Update on CloudLinux

A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privilege escalation in the same broad area — IPsec ESP and rxrpc — and named it Dirty Frag. A working public proof-of-concept exists; any unprivileged local user can use it to gain root in a single command.

Dirty Frag (CVE-2026-43284, CVE-2026-43500): Mitigation and Kernel Update on CloudLinux

A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privilege escalation in the same broad area — IPsec ESP and rxrpc — and named it Dirty Frag. A working public proof-of-concept exists; any unprivileged local user can use it to gain root in a single command.

Copy Fail (CVE-2026-31431): Patching kernels without rebooting

Most kernel CVEs follow a predictable rhythm for hosting providers: read the advisory, schedule a maintenance window, reboot during off-peak. Copy Fail (CVE-2026-31431) breaks that rhythm. It's a deterministic vulnerability, universal across Linux distributions, and lets a single compromised account on a shared host pivot to root over every other account on the same node. CISA added it to the actively-exploited list with a May 15 federal patch deadline. A severe combination for shared hosting: high impact on multi-tenant servers, and a fix that requires a reboot on every box.

 

Copy Fail (CVE-2026-31431): Patching kernels without rebooting

Most kernel CVEs follow a predictable rhythm for hosting providers: read the advisory, schedule a maintenance window, reboot during off-peak. Copy Fail (CVE-2026-31431) breaks that rhythm. It's a deterministic vulnerability, universal across Linux distributions, and lets a single compromised account on a shared host pivot to root over every other account on the same node. CISA added it to the actively-exploited list with a May 15 federal patch deadline. A severe combination for shared hosting: high impact on multi-tenant servers, and a fix that requires a reboot on every box.

 

An Update on CloudLinux's Partnership with Seahawk

CL-CloudLinuxs Partnership with Seahawk_alt

We want to give our community an update: CloudLinux has ended its business relationship with Seahawk Global, LLC / Seahawk Media LLC. The termination of the business relationship is not a reflection of the service they provide.

An Update on CloudLinux's Partnership with Seahawk

CL-CloudLinuxs Partnership with Seahawk_alt

We want to give our community an update: CloudLinux has ended its business relationship with Seahawk Global, LLC / Seahawk Media LLC. The termination of the business relationship is not a reflection of the service they provide.

CVE-2026-31431 (Copy Fail): Kernel Update on CloudLinux

CVE-2026-31431 (Copy Fail) is a Linux kernel local privilege escalation vulnerability in the algif_aead module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All kernels since 2017 are affected.

CVE-2026-31431 (Copy Fail): Kernel Update on CloudLinux

CVE-2026-31431 (Copy Fail) is a Linux kernel local privilege escalation vulnerability in the algif_aead module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All kernels since 2017 are affected.

imunify-logo

WEB SERVER SECURITY BLOG

Subscribe to CloudLinux Newsletter