We are happy to announce the release of the next pack of optimization features that relieve our hosters from even more manual work and speed up your customers’ websites. The new functionality can already be included into hosting pricing plans and can be upsold per-user. When you participate in the beta program, your customers will be able to activate the WordPress performance features right from the cPanel interface. All new modules are available for beta participants on Solo and PRO licensed servers. In addition, as an early adopter you will get all of this great value for free for the next 12 months. Let’s take a closer look at everything we have prepared for you and the benefits for website owners.
Introducing Autotracing - A New Feature Added to the CloudLinux OS

The CloudLinux team is happy to announce a new feature release called Autotracing. Autotracing automatically creates tracing tasks on the server and shows detailed analytics for the slowest URLs on a website on a daily basis. Together with all PHP X-Ray components, Autotracing gives you advanced control and manageability of PHP applications on your server.
Inside Our New AI Support Assistant: A 55% CSAT Lift and Customer Feedback to Match
A purpose-built virtual assistant — trained on our own knowledge base — is changing how customers get answers.
Inside Our New AI Support Assistant: A 55% CSAT Lift and Customer Feedback to Match
A purpose-built virtual assistant — trained on our own knowledge base — is changing how customers get answers.
Three root exploits in two weeks: What's your patching strategy?
On April 29, 2026, a Linux kernel privilege escalation called Copy Fail (CVE-2026-31431) became public on the oss-security mailing list. A short Python script, runnable by any unprivileged user, returned a root shell on most enterprise Linux servers running kernels from 2017 onward.
Three root exploits in two weeks: What's your patching strategy?
On April 29, 2026, a Linux kernel privilege escalation called Copy Fail (CVE-2026-31431) became public on the oss-security mailing list. A short Python script, runnable by any unprivileged user, returned a root shell on most enterprise Linux servers running kernels from 2017 onward.
PinTheft (CVE-2026-43494) kernel LPE: CloudLinux platforms are not affected
Researcher Aaron Esau and the V12 Security team disclosed PinTheft, a Linux kernel local privilege escalation that chains an RDS zerocopy reference-count bug with io_uring fixed buffers to overwrite the page cache of a SUID-root binary. A public proof-of-concept is available. Any unprivileged local user on an affected host can use it to gain root.
PinTheft (CVE-2026-43494) kernel LPE: CloudLinux platforms are not affected
Researcher Aaron Esau and the V12 Security team disclosed PinTheft, a Linux kernel local privilege escalation that chains an RDS zerocopy reference-count bug with io_uring fixed buffers to overwrite the page cache of a SUID-root binary. A public proof-of-concept is available. Any unprivileged local user on an affected host can use it to gain root.
How Hosting Providers Are Fixing Their VPS Profitability Problem in 2026

VPS is the biggest growth opportunity in hosting right now. According to the 2026 Web Hosting Trends Report, 65% of providers reported revenue growth last year and 26% rank VPS as their top growth category. The demand is there. The customers are signing up.
How Hosting Providers Are Fixing Their VPS Profitability Problem in 2026

VPS is the biggest growth opportunity in hosting right now. According to the 2026 Web Hosting Trends Report, 65% of providers reported revenue growth last year and 26% rank VPS as their top growth category. The demand is there. The customers are signing up.
Linux Kernel ptrace Exit-race Vulnerability / ssh-keysign-pwn (CVE-2026-46333) — Mitigation and Kernel Update on CloudLinux
Right after the kernel privilege-escalation chain in the XFRM/ESP subsystem (Copy Fail, Dirty Frag, Fragnesia), Qualys disclosed a different Linux kernel issue. This time in the ptrace access-check path. CVE-2026-46333 is reserved for tracking this vulnerability. A public proof-of-concept exists. An unprivileged local user on an affected host can use it to read root-owned secrets (SSH host private keys and the shadow password database) without obtaining root privileges directly.
Linux Kernel ptrace Exit-race Vulnerability / ssh-keysign-pwn (CVE-2026-46333) — Mitigation and Kernel Update on CloudLinux
Right after the kernel privilege-escalation chain in the XFRM/ESP subsystem (Copy Fail, Dirty Frag, Fragnesia), Qualys disclosed a different Linux kernel issue. This time in the ptrace access-check path. CVE-2026-46333 is reserved for tracking this vulnerability. A public proof-of-concept exists. An unprivileged local user on an affected host can use it to read root-owned secrets (SSH host private keys and the shadow password database) without obtaining root privileges directly.
Fragnesia (CVE-2026-46300) — Mitigation and Kernel Update on CloudLinux
Less than a week after Dirty Frag, researcher William Bowling and the V12 team disclosed a third Linux kernel local privilege escalation in the same broad area (XFRM / ESP) and named it Fragnesia. A working public proof-of-concept exists. Any unprivileged local user can use it to gain root in a single command.
Fragnesia (CVE-2026-46300) — Mitigation and Kernel Update on CloudLinux
Less than a week after Dirty Frag, researcher William Bowling and the V12 team disclosed a third Linux kernel local privilege escalation in the same broad area (XFRM / ESP) and named it Fragnesia. A working public proof-of-concept exists. Any unprivileged local user can use it to gain root in a single command.
Dirty Frag (CVE-2026-43284, CVE-2026-43500): Mitigation and Kernel Update on CloudLinux
A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privilege escalation in the same broad area — IPsec ESP and rxrpc — and named it Dirty Frag. A working public proof-of-concept exists; any unprivileged local user can use it to gain root in a single command.
Dirty Frag (CVE-2026-43284, CVE-2026-43500): Mitigation and Kernel Update on CloudLinux
A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privilege escalation in the same broad area — IPsec ESP and rxrpc — and named it Dirty Frag. A working public proof-of-concept exists; any unprivileged local user can use it to gain root in a single command.
Copy Fail (CVE-2026-31431): Patching kernels without rebooting
Most kernel CVEs follow a predictable rhythm for hosting providers: read the advisory, schedule a maintenance window, reboot during off-peak. Copy Fail (CVE-2026-31431) breaks that rhythm. It's a deterministic vulnerability, universal across Linux distributions, and lets a single compromised account on a shared host pivot to root over every other account on the same node. CISA added it to the actively-exploited list with a May 15 federal patch deadline. A severe combination for shared hosting: high impact on multi-tenant servers, and a fix that requires a reboot on every box.
Copy Fail (CVE-2026-31431): Patching kernels without rebooting
Most kernel CVEs follow a predictable rhythm for hosting providers: read the advisory, schedule a maintenance window, reboot during off-peak. Copy Fail (CVE-2026-31431) breaks that rhythm. It's a deterministic vulnerability, universal across Linux distributions, and lets a single compromised account on a shared host pivot to root over every other account on the same node. CISA added it to the actively-exploited list with a May 15 federal patch deadline. A severe combination for shared hosting: high impact on multi-tenant servers, and a fix that requires a reboot on every box.
An Update on CloudLinux's Partnership with Seahawk

An Update on CloudLinux's Partnership with Seahawk

CVE-2026-31431 (Copy Fail): Kernel Update on CloudLinux
CVE-2026-31431 (Copy Fail) is a Linux kernel local privilege escalation vulnerability in the algif_aead module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All kernels since 2017 are affected.
CVE-2026-31431 (Copy Fail): Kernel Update on CloudLinux
CVE-2026-31431 (Copy Fail) is a Linux kernel local privilege escalation vulnerability in the algif_aead module (AF_ALG). Any unprivileged local user can gain root via a 732-byte Python exploit. All kernels since 2017 are affected.






