this post was submitted on 02 May 2026
108 points (94.3% liked)

Selfhosted

58983 readers
588 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

cross-posted from: https://lemmy.ml/post/46701277

I’ve been running my home lab since 2021 and honestly thought my update routine was solid: apt update && apt upgrade, reboot, job done.

Turns out I was wrong. I was checking CVE‑2026‑31431 (Copy Fail) this morning and realised that despite my “successful” updates, I was still running a vulnerable kernel from March.

I’ve had to rethink how I handle host updates. If you’re relying on a standard upgrade and a reboot to keep Proxmox or Debian hosts safe, you might want to check if yours is lying to you as well.

top 24 comments
sorted by: hot top controversial new old
[–] DigDoug@lemmy.world 2 points 8 hours ago

Is this just a Proxmox thing? I'm running Debian on my server, and as far as I know, the kernel has always upgraded properly when there's a new one available.

[–] endlesseden@pyfedi.deep-rose.org 2 points 17 hours ago* (last edited 17 hours ago)

I honestly don't know what your talking about. proxmox updated the pve kernels immediately after this CVE was published....

additionally, this CVE only applies to older (pre-6.17 kernels). unless you are on proxmox 8 or earlier, you are already running a "patched" kernel as the pathway necessary for this was changed and in kernel 7.x and above this CVE doesnt work...

[–] Nomad@infosec.pub 2 points 2 days ago

You only need the reboot if a package update masks the retirement.

The system is not lying to you, it holds some critical updates back to be installed separately and manually.

The output shows you which packages have been held back. Just do apt-get install linux-image-amd64 for example, reboot and apt autoremove to remove the old kernel.

from my own experience, apt dist-upgrade removes old kernels, apt upgrade still installed the new kernel, grub updated and booted into the new kernel.

all dist-upgrade did (for me) was delete the old kernels. which is something I would prefer not to do because it removes any ability to rollback should I absolutely need to.

[–] tofu@lemmy.nocturnal.garden 59 points 5 days ago (3 children)

You're not supposed to run apt upgrade in Proxmox at all, it may even break your system. Use dist-upgrade.

https://pve.proxmox.com/pve-docs/chapter-sysadmin.html#system_software_updates

[–] cheesemoo@lemmy.world 1 points 2 days ago (1 children)

I'm curious, how might apt upgrade break something in Proxmox?

I don't know, I've seen it several times mentioned in the Proxmox forum. I think it's more of a theoretical scenario but it's strongly advised against.

[–] TheIPW@lemmy.ml 26 points 5 days ago (2 children)

dist-upgrade and full-upgrade are essentially the same command but yeah, I won't be using apt upgrade again in the future! Like I said in my post, the joys of being self taught is that you learn by my making mistakes and that's part of the "fun" 🤣

[–] MalReynolds@slrpnk.net 16 points 4 days ago

Nah, the fun is learning form others mistakes. Thanks for a fun read :}

[–] frongt@lemmy.zip 6 points 5 days ago (1 children)

Not essentially, exactly. One is a deprecated alias for the other.

[–] Infernal_pizza@lemmy.dbzer0.com 4 points 4 days ago (2 children)
[–] whyNotSquirrel@sh.itjust.works 7 points 4 days ago (1 children)

I thought full-upgrade replaced dist-upgrade that could make you think you're upgrading you distro to the next version

But now I'm not sure anymore.

[–] K3can@lemmy.radio 3 points 4 days ago

Correct. Full-upgrade is the new term. It's an alias, though, so using either will accomplish the same thing.

[–] Staff@piefed.world 1 points 4 days ago* (last edited 4 days ago)

dist-upgrade was used with apt-get

full-upgrade is used for apt

[–] LeTak@feddit.org 3 points 4 days ago (2 children)

Just don’t use any command in proxmox. Proxmox is designed GUI first. It got an update button in the GUI. Only major releases could need tinkering in the terminal. But even changing repos is now possible in the GUI.

Gets annoying soon if you have more than one host. Easily automated with Ansible

gotta love that GUI, that bombards you with reminders to subscribe to their paid tier repository constantly and won't let you update...

also, provides no methodology to control when it wants to overwrite a config or when a externally added signable dkms exists and creates a prompt during dkms building.

the gui is nice, but it's far from perfect...

[–] KairuByte@lemmy.dbzer0.com 4 points 4 days ago* (last edited 4 days ago)

I mean, you could just use the proxmox UI for updates. Single point for all servers, just click in and hit update. It explicitly runs dist-upgrade already.

Hmm. Welp. Let’s try. See what happens.

[–] suzune@ani.social 6 points 5 days ago* (last edited 5 days ago) (1 children)

I've seen that the patches are only available in the debian-security repository. It's important to review your repo list in /etc/apt/sources.list.d.

[–] frongt@lemmy.zip 10 points 5 days ago (1 children)

Proxmox does not use the standard debian kernel.

[–] suzune@ani.social 2 points 4 days ago

Yes, I referred to the Debian part only.

[–] BCsven@lemmy.ca 2 points 4 days ago

The nice thing about zypper is the various patch options and reporting. Gives you a good picture of what CVEs, rating, and if installed, needed, not needed etc. Does Apt have something similar?

[–] prenatal_confusion@feddit.org 2 points 4 days ago* (last edited 4 days ago)

Ooof, scared me there for a second. Good thing I am using Dist-Upgrade in my ansible scripts.