← Back
Ubuntu Copy Fail Vulnerability Fixes
Fix
Ubuntu has released fixes for CVE-2026-31431 "Copy Fail" vulnerability that was recently released.
Hatchbox enables automatic security updates by default, so this patch has already been installed on your servers. However, this patch requires a restart to be applied.
To apply these fixes:
- Click "Update" on your server in Hatchbox
- Then "Reboot"
This will apply the fixes and restart your server to ensure the latest kernel is being used.
Alternatively, you can patch your server over SSH:
sudo apt update && sudo apt upgrade && sudo reboot
To verify your server is safe:
Run this command as the deploy user over SSH:
$ curl https://raw.githubusercontent.com/rootsecdev/cve_2026_31431/refs/heads/main/test_cve_2026_31431.py | python3
[*] CVE-2026-31431 detector kernel=5.15.0-171-generic arch=x86_64
[i] Kernel 5.15.0-171-generic predates the affected 6.12/6.17/6.18 lines; trigger may not apply even if prerequisites match.
[+] Precondition not met ('authencesn(hmac(sha256),cbc(aes))' cannot be instantiated (No such file or directory)). NOT vulnerable.