
Notice Links:
| Posted | Mon, 4 May 2026 22:42 PM UTC
Mon, 4 May 2026 18:42 PM EDT |
|---|---|
| Last Update | Mon, 4 May 2026 23:28 PM UTC (48 hours ago)
Mon, 4 May 2026 19:28 PM EDT |
| Status | Open |
| Affected Location | Dallas (TX) |
As part of our regular network operations, we will perform a routing change during the maintenance window below. Maintenance Window: Impact: We will provide an update once the work has been completed. # | |
| Posted | Wed, 22 Apr 2026 20:50 PM UTC
Wed, 22 Apr 2026 16:50 PM EDT |
|---|---|
| Last Update | Wed, 22 Apr 2026 20:50 PM UTC (14 days ago)
Wed, 22 Apr 2026 16:50 PM EDT |
| Status | Open |
This work involves replacement of parts in UPS units, as part of normal manufacturer recomended maintenance. No impact is expected. Maintenance Start: 05/05/2026 23:00 US/Eastern During this activity, supply will transfer the facility load from utility to generator. Then back to utility upon completion of the maintenance. # | |
| Posted | Wed, 29 Apr 2026 01:11 AM UTC
Tue, 28 Apr 2026 21:11 PM EDT |
|---|---|
| Last Update | Sun, 3 May 2026 21:49 PM UTC (74 hours ago)
Sun, 3 May 2026 17:49 PM EDT |
| Status | Closed |
|
A security issue has been identified in the cPanel software affecting all currently supported versions relating to various authentication paths. Please run the following command to retrieve the patched version. /scripts/upcp --force Should you need assistance with this, please pop in a support ticket. # | |
| Posted | Fri, 1 May 2026 04:10 AM UTC
Fri, 1 May 2026 00:10 AM EDT |
|---|---|
| Last Update | Sat, 2 May 2026 22:35 PM UTC (97 hours ago)
Sat, 2 May 2026 18:35 PM EDT |
| Status | Closed |
Update at Sat, 2 May 2026 22:33 PM UTC: VMs are now running on new kernels. We worked through a few restart issues with a few customers. Now would be a good time to check your services are all running as expected. Let us know if we can assist with anything! A serious Linux kernel vulnerability has been publicly disclosed: This issue is tracked as CVE-2026-31431, also known as Copy Fail. It affects many Linux kernels shipped from 2017 onwards. The issue allows a local unprivileged user or process to gain root privileges. In practical terms, if an attacker already has access to run code inside a VM, for example through a compromised website, shell account, or application, this bug may allow them to take full control of that VM. We have pushed patched kernels to our VM hosts. No action is required, but an urgent restart is strongly recommendedWe will be restarting affected customer VMs with the patched kernel. No action is required by you. However, it is best if you can switch to the patched kernel as soon as possible rather than waiting for us. Switching to the patched kernelYour VM needs to be restarted to boot into the patched kernel. You can restart it yourself now using one of these methods:
After the restart, your VM should be running the patched kernel. You can check with:
For example a fixed kernel looks like:
The kernel version should show a build date of 20260430 or newer. Those digits are the date: 30 April 2026. Your VM will be restartedBecause this is a serious privilege escalation issue and public exploit code is available, we will restart VMs that are still running an older kernel. We will start those restarts from:
The restart should be a normal VM reboot. Your VM will be unavailable while it restarts. We will not restart servers already on a patched kernel. If you want to control the timing, please restart your VM before then. If you do not want us to restart your VM, please open a support ticket and ask us to add this tag to your server notes:
Please note that opting out means your VM may continue running a vulnerable kernel until you restart it yourself. Notes
| |
| Posted | Thu, 2 Apr 2026 01:07 AM UTC
Wed, 1 Apr 2026 21:07 PM EDT |
|---|---|
| Last Update | Fri, 1 May 2026 02:10 AM UTC (6 days ago)
Thu, 30 Apr 2026 22:10 PM EDT |
| Status | Closed |
| Affected service | |
Fri, 1 May 2026 02:07 AM UTC: All activities complete Tue, 28 Apr 2026 04:18 AM UTC: These have been delayed, and are now rescheduled from 4am 30th April UTC (11pm Dallas time) host1228.rimuhosting.com requires routine maintenance. To minimise customer disruption we will be moving VPSs running there to an alternate host. Scheduled: from 4am 27th April UTC (11pm 26th Dallas) Detail: One at a time, VPSs will be stopped, the filesystem moved to an alternate host, and then restarted on the new host. Moves will take roughly 1min/GB of disk. # | |