cross-posted from: https://lemmy.ml/post/46701277

I’ve been running my home lab since 2021 and honestly thought my update routine was solid: apt update && apt upgrade, reboot, job done.

Turns out I was wrong. I was checking CVE‑2026‑31431 (Copy Fail) this morning and realised that despite my “successful” updates, I was still running a vulnerable kernel from March.

I’ve had to rethink how I handle host updates. If you’re relying on a standard upgrade and a reboot to keep Proxmox or Debian hosts safe, you might want to check if yours is lying to you as well.

  • whyNotSquirrel@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    7
    ·
    1 day ago

    I thought full-upgrade replaced dist-upgrade that could make you think you’re upgrading you distro to the next version

    But now I’m not sure anymore.

    • K3CAN@lemmy.radio
      link
      fedilink
      English
      arrow-up
      3
      ·
      24 hours ago

      Correct. Full-upgrade is the new term. It’s an alias, though, so using either will accomplish the same thing.