Documentation Index
Fetch the complete documentation index at: https://forge.laravel.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
Overview
A critical Linux kernel vulnerability, CVE-2026-31431 (“Copy Fail”), was publicly disclosed in April 2026. The flaw is a logic error in the kernel’sauthencesn component that allows an unprivileged local user to escalate their privileges to full root (administrator) access. Ubuntu released a kernel patch for this issue on April 2, 2026.
The vulnerability chains two kernel subsystems — the AF_ALG crypto API socket interface and the splice() system call — to perform a 4-byte write to the page cache. This can be used to modify the behavior of a setuid binary without requiring a race condition or kernel-specific offsets, making it highly reliable.
What Forge has already done
Because Laravel Forge enables automatic security updates by default, the patchedkmod package has already been downloaded and installed on servers where this feature is enabled. However, the fix does not take effect until the server is rebooted, and Forge does not reboot servers automatically.
Affected Ubuntu versions
| Ubuntu Version | Status |
|---|---|
| 24.04 LTS | Patched — fix available via kmod package |
| 22.04 LTS | Patched — fix has been backported |
| 20.04 LTS | Patched — fix has been backported |
| 18.04 LTS | Not patched — this version has reached end of life and will not receive a fix |
What you need to do
Step 1: Check your current kmod version
Before applying the fix, we recommend SSHing into your server and confirming the currently installedkmod version:
Step 2: Apply the fix
If automatic security updates are enabled, the patched package is already on your server and you only need to reboot. You can reboot directly from the Forge dashboard by navigating to your server and selecting Reboot Server from the server management panel.If your servers are hosted on AWS, rebooting will allocate a new IP address to the server. You will need to update the IP address in the Forge dashboard after the reboot completes.
Step 3: Verify the fix is active
After the server has rebooted, SSH back in and rundpkg -l kmod again to confirm that the installed version is newer than the one recorded in Step 1:
Temporary mitigation (without rebooting)
If you are unable to reboot immediately, you can disable the vulnerablealgif_aead kernel module as a temporary measure. This does not affect services such as dm-crypt, LUKS, kTLS, IPsec, or standard OpenSSL/GnuTLS builds.