Documentation Index
Fetch the complete documentation index at: https://forge.laravel.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
Overview
A critical Linux kernel vulnerability, CVE-2026-31431 (“Copy Fail”), was publicly disclosed in April 2026. The flaw is a logic error in the kernel’sauthencesn component that allows an unprivileged local user to escalate their privileges to full root (administrator) access. Ubuntu released a kernel patch for this issue on April 2, 2026.
The vulnerability chains two kernel subsystems — the AF_ALG crypto API socket interface and the splice() system call — to perform a 4-byte write to the page cache. This can be used to modify the behavior of a setuid binary without requiring a race condition or kernel-specific offsets, making it highly reliable.
What Forge has already done
Because Laravel Forge enables automatic security updates by default, the kernel patch has already been downloaded and installed on servers where this feature is enabled. However, kernel patches do not take effect until the server is rebooted, and Forge does not reboot servers automatically.Affected Ubuntu versions
| Ubuntu Version | Status |
|---|---|
| 24.04 LTS | Patched — requires kernel 6.8.0-107.107 or above |
| 22.04 LTS | Patched — patch has been backported |
| 20.04 LTS | Patched — patch has been backported |
| 18.04 LTS | Not patched — this version has reached end of life and will not receive a fix |
What you need to do
If automatic security updates are enabled
The patch is already installed on your server. You simply need to reboot to activate it. You can reboot your server directly from the Forge dashboard by navigating to your server, then selecting Reboot Server from the server management panel.If your servers are hosted on AWS, rebooting will allocate a new IP address to the server. You will need to update the IP address in the Forge dashboard after the reboot completes.
If automatic security updates are disabled
You will need to apply the patch manually via SSH before rebooting:Verifying the patch is active
After rebooting, you can confirm the running kernel version by SSHing into your server and running:6.8.0-107.107 or higher. On Ubuntu 20.04 and 22.04, confirm the date of the kernel package is April 2, 2026 or later:
Temporary mitigation (without rebooting)
If you are unable to reboot immediately, you can disable the vulnerablealgif_aead kernel module as a temporary measure. This does not affect services such as dm-crypt, LUKS, kTLS, IPsec, or standard OpenSSL/GnuTLS builds.