Stay updated with the latest web hosting news, offers, and important notifications. Get real-time updates about server maintenance, new features, and exclusive discounts for AquaHost users.
Dear Customers,The previously reported email-related issues affecting Singapore-based shared hosting servers have now been resolved successfully.Curre...
Read More
Dear Customers,
The previously reported email-related issues affecting Singapore-based shared hosting servers have now been resolved successfully.
Current Status
• Mail services are expected to function normally again
• SMTP/mail connectivity should now be stable for most users
If you are still facing any issue such as:
• Email sending failure
• Email receiving delays
• SMTP authentication problems
• Mail login/access issues
Kindly raise a support ticket with:
• Proper error details
• Screenshot/logs (if available)
• Affected email/domain information
Our technical/support team will review the issue and contact you as soon as possible for further assistance and resolution.
Thank you for your patience and cooperation during the maintenance and troubleshooting process.
Dear Customers,The scheduled security updates and maintenance activities on the following server locations have now been completed successfully:• In...
Read More
Dear Customers,
The scheduled security updates and maintenance activities on the following server locations have now been completed successfully:
• Indian Server 1
• Finland Server
• Singapore Server
The updates were performed to improve:
• Server stability
• Overall security
• Service performance
• Infrastructure reliability
Current Status
• All major services are expected to function normally again
• Temporary maintenance-related interruptions should now be resolved
If you are still facing any issue such as:
• Website downtime
• cPanel/login problems
• Slow loading
• Mail-related issues
Kindly check the service manually once and contact support with updated screenshots/details if the issue still persists.
We appreciate your patience and cooperation during the maintenance period.
Dear Customers,Important security updates and maintenance activities are scheduled for the following server locations:• Indian server 1• Finland S...
Read More
Dear Customers,
Important security updates and maintenance activities are scheduled for the following server locations:
• Indian server 1
• Finland Server
• Singapore Server
During this maintenance period, some users may temporarily experience:
• Short-term downtime
• Slow website loading
• Temporary cPanel/login issues
• Brief service interruptions during update/restart process
These updates are being applied to improve server stability, performance, and overall security.
We recommend avoiding critical changes/uploads during the maintenance window.
We appreciate your patience and understanding.
Dear Customers,A scheduled maintenance activity is currently ongoing on our Singapore location/server infrastructure.During this maintenance window, s...
Read More
Dear Customers,
A scheduled maintenance activity is currently ongoing on our Singapore location/server infrastructure.
During this maintenance window, some users may temporarily experience:
• Short-term downtime
• Slow loading/access delays
• Temporary cPanel/login access issues
• Intermittent website/service connectivity interruptions
Current Status
• The technical team is actively working on the maintenance and optimization process
• Services are expected to stabilize gradually once maintenance is completed
Estimated Resolution Time
• Maintenance is expected to be completed by tonight
We appreciate your patience and understanding during this maintenance period.
Dear Customers,A newly disclosed Linux kernel vulnerability named Dirty Frag allows Local Privilege Escalation (LPE) to root user access on vulnerable...
Read More
Dear Customers,
A newly disclosed Linux kernel vulnerability named Dirty Frag allows Local Privilege Escalation (LPE) to root user access on vulnerable systems.
Vulnerability Information
Dirty Frag was publicly disclosed on May 7, 2026.
The vulnerability is related to the previously disclosed Copy/Fail vulnerability (CVE-2026-31431) and is considered a continuation of the Dirty Pipe exploit class (CVE-2022-0847).
The issue exists within the Linux kernel itself and may affect multiple Linux distributions.
Potential Impact
Systems running Linux kernel versions released after approximately Linux 4.14 (2017+) may be vulnerable.
Successful exploitation may allow attackers with local access to:
• Gain root-level privileges
• Modify kernel page cache memory
• Compromise binaries loaded by the kernel
• Fully compromise affected servers
Potentially Affected Operating Systems
• CloudLinux 7 Hybrid
• CloudLinux 8
• CloudLinux 9
• CloudLinux 10
• AlmaLinux 8
• AlmaLinux 9
• AlmaLinux 10
• Rocky Linux 8
• Rocky Linux 9
• Ubuntu 20.04
• Ubuntu 22.04
• Ubuntu 24.04
Current Status
At the time of publication, official upstream kernel patches are still being prepared and distributed by Linux maintainers and vendors.
Until stable patches are officially released, temporary mitigations are strongly recommended.
Temporary Mitigation
Run the following command as root user:
sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"
After that, flush kernel page cache:
echo 3 > /proc/sys/vm/drop_caches
After completing both commands, reboot the server once to ensure mitigation changes are properly applied.
Recommended Actions
• Apply temporary mitigation immediately
• Monitor official vendor advisories for stable kernel updates
• Restrict shell access for untrusted users
• Keep servers and cPanel environments fully updated
• Reboot servers after official kernel patches are installed
AquaHost Advisory
Customers using VPS or dedicated Linux environments are strongly advised to monitor this issue carefully and apply security updates immediately once officially released by their operating system vendor.
AquaHost will continue monitoring vendor advisories and security developments related to this vulnerability.