ylai@lemmy.ml to Technology@lemmy.worldEnglish · 10 months agoMicrosoft waited 6 months to patch actively exploited admin-to-kernel vulnerabilitywww.theregister.comexternal-linkmessage-square16fedilinkarrow-up1355arrow-down17cross-posted to: [email protected]
arrow-up1348arrow-down1external-linkMicrosoft waited 6 months to patch actively exploited admin-to-kernel vulnerabilitywww.theregister.comylai@lemmy.ml to Technology@lemmy.worldEnglish · 10 months agomessage-square16fedilinkcross-posted to: [email protected]
minus-squarehenfredemars@infosec.publinkfedilinkEnglisharrow-up4·10 months agoThe package manager doesn’t have special permission. The new kernel you download is also signed for you and trusted by your system. If it wasn’t trusted, would the next time you boot the kernel won’t load because the bootloader will refuse to load the unsigned code.
The package manager doesn’t have special permission. The new kernel you download is also signed for you and trusted by your system.
If it wasn’t trusted, would the next time you boot the kernel won’t load because the bootloader will refuse to load the unsigned code.