ylai@lemmy.ml to Technology@lemmy.worldEnglish · 8 months agoMicrosoft waited 6 months to patch actively exploited admin-to-kernel vulnerabilitywww.theregister.comexternal-linkmessage-square16fedilinkarrow-up1355arrow-down17cross-posted to: cybersecurity@infosec.pub
arrow-up1348arrow-down1external-linkMicrosoft waited 6 months to patch actively exploited admin-to-kernel vulnerabilitywww.theregister.comylai@lemmy.ml to Technology@lemmy.worldEnglish · 8 months agomessage-square16fedilinkcross-posted to: cybersecurity@infosec.pub
minus-squarehenfredemars@infosec.publinkfedilinkEnglisharrow-up4·8 months agoThe package manager doesn’t have special permission. The new kernel you download is also signed for you and trusted by your system. If it wasn’t trusted, would the next time you boot the kernel won’t load because the bootloader will refuse to load the unsigned code.
The package manager doesn’t have special permission. The new kernel you download is also signed for you and trusted by your system.
If it wasn’t trusted, would the next time you boot the kernel won’t load because the bootloader will refuse to load the unsigned code.