In progress - Scheduled maintenance is currently in progress. We will provide updates as necessary.
May 07, 2026 - 19:30 EDT
Scheduled - A high-priority vulnerability, identified as DirtyFrag, has been detected within specific Linux kernel network modules. This flaw allows for unauthorized memory manipulation via targeted network packets. To ensure the continued integrity of our infrastructure and protect against potential remote code execution or data corruption, we are implementing immediate mitigation steps on our webhosting and storage servers rolling out now.
The above mitigation will stop this specific exploit. Vendor kernel updates are not yet fully released.
Kernelcare will be issuing patches. Users with KVM or Dedicated Servers running linux are recommended to consider security updates via kernelcare for rebootless updates. Further information is at https://blog.cloudlinux.com/dirty-frag-mitigation-and-kernel-update
May 7, 202619:30 - May 9, 202619:30 EDT
Completed -
The scheduled maintenance has been completed.
May 2, 11:15 EDT
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Apr 30, 10:15 EDT
Scheduled -
Cloudlinux based shared hosting servers will have rolling reboots starting today in order to address cve-2026-31431 - Please review https://www.interserver.net/tips/cve-2026-31431-mitigation/ for further information.
Apr 30, 10:01 EDT
Please run the following command to retrieve the patched version.
/scripts/upcp --force
You can confirm you are on a patched version of cPanel with the following command:
/usr/local/cpanel/cpanel -V
As long as the output matches one of the above versions, then your system has been patched.
Warning: If your server is not running a supported version of cPanel that is eligible for this update, it is recommended to firewall off port 2078-2096 and migrate to a supported version of cpanel/WHM.
Apr 29, 12:07 EDT