Hello everyone. Glad the issue is now fixed.
FYI I've received yesterday a legit notification from Hostinger mentioning the following:
**Linux kernel vulnerability disclosed (CVE-2026-31431)**
A security flaw called "Copy Fail" (CVE-2026-31431) has been found in the Linux kernel. It affects nearly all major Linux distributions ā including Ubuntu, Debian, RHEL, Amazon Linux, SUSE, Fedora, and more ā on any kernel built between 2017 and today.
The vulnerability lets a local user gain full admin access to a server. It can also affect containerized environments.
The fix takes just a few minutes.
Option 1: Update your kernel (recommended)
For Ubuntu/Debian: sudo apt update, sudo apt upgrade -y
For RHEL-based systems: sudo yum update
Then reboot your server.
Option 2: Disable the affected module (temporary fix)
If updating right now isn't an option, disable the vulnerable module to reduce exposure:
echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf rmmod algif_aead 2>/dev/null || true
This won't affect SSH, TLS, LUKS, or OpenSSL."
I'm wondering. Is this issue already addressed by Cloudron's latest updates or should I apply the fix myself ?
Thanks for your support and happy workers' Day