← Back

Ubuntu Copy Fail Vulnerability Fixes

Fix

Ubuntu has released fixes for CVE-2026-31431 "Copy Fail" vulnerability that was recently released.

Hatchbox enables automatic security updates by default, so this patch has already been installed on your servers. However, this patch requires a restart to be applied.

To apply these fixes:

  1. Click "Update" on your server in Hatchbox
  2. Then "Reboot"

This will apply the fixes and restart your server to ensure the latest kernel is being used.

Alternatively, you can patch your server over SSH:

sudo apt update && sudo apt upgrade && sudo reboot

To verify your server is safe:

Run this command as the deploy user over SSH:

$ curl https://raw.githubusercontent.com/rootsecdev/cve_2026_31431/refs/heads/main/test_cve_2026_31431.py | python3
[*] CVE-2026-31431 detector kernel=5.15.0-171-generic arch=x86_64
[i] Kernel 5.15.0-171-generic predates the affected 6.12/6.17/6.18 lines; trigger may not apply even if prerequisites match.
[+] Precondition not met ('authencesn(hmac(sha256),cbc(aes))' cannot be instantiated (No such file or directory)). NOT vulnerable.