- Server operating system version
- Debian 12 server (currently running version 6.1.147-1 / 6.1.0-38-amd64 with Plesk Obsidian 18.0.77).
- Plesk version and microupdate number
- 18.0.77
Hello,
I am trying to update the kernel on my Debian 12 server (currently running version 6.1.147-1 / 6.1.0-38-amd64 with Plesk Obsidian 18.0.77).
My system currently reports that "all packages are up to date," but this kernel version is vulnerable to the CVE-2026-31431 ("Copy Fail") local privilege escalation exploit. I need to upgrade to a patched version (6.1.170-2 or higher).
Could you please verify if I need to adjust my /etc/apt/sources.list to include the correct Debian security repositories? I want to ensure that any changes I make will not conflict with the existing Plesk repositories or break the control panel.
Thank you for your assistance.
root@server:~# sudo apt update
Get:1 file:/etc/apt/mirrors/debian.list Mirrorlist [30 B]
Get:2 file:/etc/apt/mirrors/debian-security.list Mirrorlist [39 B]
Hit:5 Index of /WATCHDOG_3.1.0 bookworm InRelease
Hit:7 Index of /pool/PSA_18.0.77_18801 bookworm InRelease
Hit:8 Index of /PHP74_17 bookworm InRelease
Hit:9 Index of /PHP84_17 bookworm InRelease
Hit:3 Index of /debian bookworm InRelease
Hit:4 Index of /debian bookworm-updates InRelease
Get:6 Index of /debian-security bookworm-security InRelease [48.0 kB]
Fetched 48.0 kB in 1s (90.9 kB/s)
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
All packages are up to date.
root@server:~# sudo apt upgrade
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Calculating upgrade... Done
The following package was automatically installed and is no longer required:
libc6-i386
Use 'sudo apt autoremove' to remove it.
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
I am trying to update the kernel on my Debian 12 server (currently running version 6.1.147-1 / 6.1.0-38-amd64 with Plesk Obsidian 18.0.77).
My system currently reports that "all packages are up to date," but this kernel version is vulnerable to the CVE-2026-31431 ("Copy Fail") local privilege escalation exploit. I need to upgrade to a patched version (6.1.170-2 or higher).
Could you please verify if I need to adjust my /etc/apt/sources.list to include the correct Debian security repositories? I want to ensure that any changes I make will not conflict with the existing Plesk repositories or break the control panel.
Thank you for your assistance.
root@server:~# sudo apt update
Get:1 file:/etc/apt/mirrors/debian.list Mirrorlist [30 B]
Get:2 file:/etc/apt/mirrors/debian-security.list Mirrorlist [39 B]
Hit:5 Index of /WATCHDOG_3.1.0 bookworm InRelease
Hit:7 Index of /pool/PSA_18.0.77_18801 bookworm InRelease
Hit:8 Index of /PHP74_17 bookworm InRelease
Hit:9 Index of /PHP84_17 bookworm InRelease
Hit:3 Index of /debian bookworm InRelease
Hit:4 Index of /debian bookworm-updates InRelease
Get:6 Index of /debian-security bookworm-security InRelease [48.0 kB]
Fetched 48.0 kB in 1s (90.9 kB/s)
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
All packages are up to date.
root@server:~# sudo apt upgrade
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Calculating upgrade... Done
The following package was automatically installed and is no longer required:
libc6-i386
Use 'sudo apt autoremove' to remove it.
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.