At myshophosting, the security of your websites, email, and data is always our top priority. We take a proactive approach to protecting our customers, and this week was no exception.
Our Response to CVE-2026-41940 & CVE-2026-43500
A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privilege escalation in the same broad area — IPsec ESP and rxrpc — and named it Dirty Frag [CVE-2026-43284]. A working public proof-of-concept exists; any unprivileged local user can use it to gain root in a single command.
Here’s how we responded:
- 8th May April 2026 – Informed by cPanel of the CVE
- 8th May 2026 ~11:00 AM AEST: We applied the recommended mitigations as advised by Cloud Linux
- 9th May 2026 – 2:10 AM AEST – Confirmed all servers patched.
Result: No evidence of any successful compromise was found on any myshophosting server.
We will continue to monitor the situation and will provide follow up blog posts should they be required.
References:
https://almalinux.org/blog/2026-05-07-dirty-frag/
https://blog.cloudlinux.com/dirty-frag-mitigation-and-kernel-update