Regarding the latest disastrous Linux vulnerability, CVE-2026-31431, multiple sources recommend mitigating the issue by disabling the algif_aead module, e.g. by running
Even the reknown Heise publishing company is missing an important point in „Copy Fail“: Linux-root in allen großen Distributionen mit 732 Byte Python
In many distributions, algif_aead is not a module, but built into your kernel. This makes the above command useless. For example all Hetzner Linux images have it built-in, but also images by many other vendors. To test, whether the module is available from the kernel, run
If the result ends with "=y", algif_aead is built-in.
You absolutely must update your Linux kernel to the latest version to mitigate the issue. It is not sufficient to disable the "module", because actually, on many systems it's not a module, but built into the kernel. This also requires a reboot after updating. Do not choose the seemingly easier paths. they won't help.
echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif-aead.conf && rmmod algif_aead 2>/dev/nullEven the reknown Heise publishing company is missing an important point in „Copy Fail“: Linux-root in allen großen Distributionen mit 732 Byte Python
In many distributions, algif_aead is not a module, but built into your kernel. This makes the above command useless. For example all Hetzner Linux images have it built-in, but also images by many other vendors. To test, whether the module is available from the kernel, run
grep CONFIG_CRYPTO_USER_API_AEAD /boot/config-$(uname -r)If the result ends with "=y", algif_aead is built-in.
You absolutely must update your Linux kernel to the latest version to mitigate the issue. It is not sufficient to disable the "module", because actually, on many systems it's not a module, but built into the kernel. This also requires a reboot after updating. Do not choose the seemingly easier paths. they won't help.