I’ve been running my home lab since 2021 and honestly thought my update routine was solid: apt update && apt upgrade, reboot, job done.
Turns out I was wrong. I was checking CVE‑2026‑31431 (Copy Fail) this morning and realised that despite my “successful” updates, I was still running a vulnerable kernel from March.
I’ve had to rethink how I handle host updates. If you’re relying on a standard upgrade and a reboot to keep Proxmox or Debian hosts safe, you might want to check if yours is lying to you as well.



I’ve been running Debian since 2007 and never understood the point of
apt upgrade.When I update, I want the updated version for everything on my system.
I don’t want to arbitrarily hold back packages just because a dependency changed. I’ll decide for myself if that’s an issue in my deployment. And Debian is generally very good at keeping everything running exactly the same way between releases.
I pin the release by name (not “stable”) and then
apt dist-upgradealways.I’ve always been doing apt dist-upgrade. What’s the difference between dist-upgrade and full-upgrade?
none.