Good to hear that it worked - if possible, you should look into upgrading the box to 42.3 as 13.1 no longer receives any security patches. Please make sure you have backups of all important data before you try it and because it’s a massive jump, I would suggest upgrading offline (ie. USB stick or DVD)
This is of course only really important if this box is facing the internet somehow and not inside a secured LAN.
This server is used for network monitoring and graphing and is not Internet facing… it’s running on a VM.
To be truthful, I have so many Ruby and Python scripts running on this machine that I’m totally paranoid about ever upgrading anything on it because of issues like what I just encountered
Be aware that because your machine is not Internet facing does not protect you against potentially catastrophic attack.
If you’re running 13.1,
There have been published “once in a lifetime” kernel vulnerabilities which it would still be subject to, which can result in arbitrary data written.
There have been published “once in a lifetime” vulnerabilities to the Diffie Hellman key exchange which affects practically all network encryption including SSL, SSH, VPNs and more.
In other words, if an attacker gained some kind of foothold in your network, this one machine could then be one juicy target to provide a stepping stone to very quick and immediate full network compromise. It’s also just sitting there which could be devastating if you even make a mistake one day.
You’d have to be certain that other machines with access to this machine wouldn’t be compromised by a phishing attack and more.
Depending on the nature and design/security of your network a fully vulnerable machine might be “only” an acceptable risk in some eyes but it won’t be long if not already that it’s a really, really questionable risk.