Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Are Ubuntu security updates still automatic?

    Solved Support ubuntu server security
    8
    0 Votes
    8 Posts
    67 Views
    imc67I
    we're getting closer, this is a part of the scheduled one this morning: 2026-02-06 06:09:31,611 WARNING Could not figure out development release: Distribution data outdated. Please check for an update for distro-info-data. See /usr/share/doc/distro-info-data/README.Debian for details. 2026-02-06 06:09:31,612 INFO Starting unattended upgrades script 2026-02-06 06:09:31,612 INFO Allowed origins are: o=Ubuntu,a=jammy, o=Ubuntu,a=jammy-security, o=UbuntuESMApps,a=jammy-apps-security, o=UbuntuESM,a=jammy-infra-security 2026-02-06 06:09:31,613 INFO Initial blacklist: 2026-02-06 06:09:31,613 INFO Initial whitelist (not strict): 2026-02-06 06:09:46,207 INFO Packages that will be upgraded: libc-bin libc-dev-bin libc6 libc6-dev libssl3 linux-generic linux-headers-generic linux-image-generic linux-libc-dev locales mysql-client-8.0 mysql-client-core-8.0 mysql-server-8.0 mysql-server-core-8.0 openssl screen 2026-02-06 06:09:46,208 INFO Writing dpkg log to /var/log/unattended-upgrades/unattended-upgrades-dpkg.log 2026-02-06 06:09:48,505 ERROR Installing the upgrades failed! 2026-02-06 06:09:48,505 ERROR error message: installArchives() failed 2026-02-06 06:09:48,506 ERROR dpkg returned a error! See /var/log/unattended-upgrades/unattended-upgrades-dpkg.log for details 2026-02-06 06:09:48,952 INFO Package libc-bin is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:48,954 INFO Package libc-dev-bin is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:48,956 INFO Package libc6 is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:48,957 INFO Package libc6-dev is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,016 INFO Package libssl3 is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,037 INFO Package linux-generic is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,044 INFO Package linux-headers-generic is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,051 INFO Package linux-image-generic is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,058 INFO Package linux-libc-dev is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,165 INFO Package locales is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,172 INFO Package mysql-client-8.0 is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,174 INFO Package mysql-client-core-8.0 is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,175 INFO Package mysql-server-8.0 is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,177 INFO Package mysql-server-core-8.0 is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,189 INFO Package openssl is kept back because a related package is kept back or due to local apt_preferences(5). 2026-02-06 06:09:49,224 INFO Package screen is kept back because a related package is kept back or due to local apt_preferences(5). The mentioned /var/log/unattended-upgrades/unattended-upgrades-dpkg.log: Log started: 2026-02-06 06:09:46 Preconfiguring packages ... Preconfiguring packages ... dpkg: unrecoverable fatal error, aborting: unknown system group 'netdata' in statoverride file; the system group got removed before the override, which is most probably a packaging bug, to recover you can remove the override manually with dpkg-statoverride E:Sub-process /usr/bin/dpkg returned an error code (2) Log ended: 2026-02-06 06:09:47 This is a left over of a "total" removing (2 weeks ago) of netdata installation years ago (now we have graphs in Cloudron 9 we don't need it anymore), I did: sudo dpkg-statoverride --list | grep netdata root netdata 755 /usr/share/netdata/www root netdata 755 /var/lib/netdata/www ~# sudo dpkg-statoverride --remove /usr/share/netdata/www ~# sudo dpkg-statoverride --remove /var/lib/netdata/www ~# sudo dpkg-statoverride --list | grep netdata I'll check tomorrow if the nightly unattended upgrade did work. Thanks @James for pointing the right direction!
  • 3 Votes
    1 Posts
    50 Views
    No one has replied
  • 4 Votes
    2 Posts
    147 Views
    No one has replied
  • How to update Redis vulnerable version (#RediShell) ?

    Solved Support redis security
    4
    3 Votes
    4 Posts
    683 Views
    girishG
    I updated redis to 8.2.2 - https://git.cloudron.io/platform/box/-/commit/3547be34010a737d9fbd5aed5bb9e787eeff5456
  • 535 5.7.8 Authentication failed - SMTP Error

    Solved Support ratelimit security smtp authentication
    12
    0 Votes
    12 Posts
    2k Views
    jamesJ
    Hello @webliska After our private chat and the suggestion to add IPv6 is this still an issue, or can I mark this topic as solved?
  • VPS Security Hardening

    Solved Support security
    5
    1 Votes
    5 Posts
    1k Views
    L
    @james make sense! thanks for your thorough explanations
  • Reflection attack via STUN/TURN

    Solved Support turn firewall security
    3
    5 Votes
    3 Posts
    785 Views
    girishG
    Thanks for reporting. I have added a rule in the firewall for outbound turn - https://git.cloudron.io/platform/box/-/commit/83d7535d84791cf27e0d1ded5fe700233947a1d9
  • Vulnerabilities in Ingress NGINX

    Solved Support nginx security
    3
    2 Votes
    3 Posts
    700 Views
    d19dotcaD
    @Kubernetes Yeah this is specific to the Nginx Ingress Controller which runs on Kubernetes. It won’t be related to Cloudron at all since Cloudron doesn’t use Kubernetes. Cloudron won’t be vulnerable to this.
  • Is Someone from the Cloudron Team Available to Discuss Security?

    Solved Support security
    5
    1 Votes
    5 Posts
    3k Views
    V
    Thank you for the clarification, @girish . I have already reached out to security@cloudron.io and I’m currently awaiting a reply. I appreciate your assistance and look forward to hearing back soon. Best regards,
  • Possibility to disable TURN service

    Feature Requests turn stun services security
    2
    1 Votes
    2 Posts
    680 Views
    J
    A temporary workaround: docker stop turn . Some platform updates might turn back the turn service on though (when updating the turn docker image).
  • 1 Votes
    4 Posts
    1k Views
    girishG
    This doesn't affect Cloudron as such but the upcoming mail addon update contains the fix.
  • 3 Votes
    5 Posts
    2k Views
    girishG
    @jagan from a quick reading, this doesn't apply to Cloudron, since we don't use fpm for WordPress (we use modphp)
  • Fail2Ban question

    Moved Solved Support docs security
    2
    0 Votes
    2 Posts
    1k Views
    girishG
    @dsp76 that line is outdated, I will fix it. Cloudron apps do see the remote IP. In the past, they were hidden. But we got enough complaints that event logs inside apps were not useful anymore with internal private IPs. So, we have fixed up apps to have access to the Client/remote IP.
  • Security update of the machine's Ubuntu

    Solved Support ubuntu security
    3
    1
    1 Votes
    3 Posts
    1k Views
    girishG
    You can also check apt list --upgradable | grep security if those are actually security updates.
  • Security bug that allow unauthorized access

    Locked Solved Support security password
    7
    0 Votes
    7 Posts
    2k Views
    girishG
    On second thoughts, I will mark this issue as 'resolved' here. If you can send us a detailed report to security@cloudron.io , would be much appreciated. edit: i actually see that you already reported this there. Thanks, let's follow up there.
  • SMTP Server of Cloudron - rate limit

    Solved Support email security
    3
    1 Votes
    3 Posts
    908 Views
    girishG
    There are some hard coded rate limits - https://docs.cloudron.io/security/#rate-limits
  • Security Ubuntu

    Solved Support security
    9
    1 Votes
    9 Posts
    3k Views
    O
    OK, I'll try. Thanks for your suggestions.
  • 0 Votes
    1 Posts
    287 Views
    No one has replied
  • Vultr Vulnerability

    Solved Support security vultr
    9
    2 Votes
    9 Posts
    3k Views
    ryangorleyR
    @girish Yeah, I'm thinking the same thing. ubuntu is a sudo user, and if the default password Vultr was using was exploited, then I'd have to be looking or processes run by anything. I'll migrate. Thanks again.
  • 0 Votes
    1 Posts
    254 Views
    No one has replied