ylai@lemmy.ml to Technology@lemmy.worldEnglish · 10 months agoMicrosoft waited 6 months to patch actively exploited admin-to-kernel vulnerabilitywww.theregister.comexternal-linkmessage-square17fedilinkarrow-up1354arrow-down17
arrow-up1347arrow-down1external-linkMicrosoft waited 6 months to patch actively exploited admin-to-kernel vulnerabilitywww.theregister.comylai@lemmy.ml to Technology@lemmy.worldEnglish · 10 months agomessage-square17fedilink
minus-squarehenfredemars@infosec.publinkfedilinkEnglisharrow-up4·10 months agoThe package manager doesn’t have special permission. The new kernel you download is also signed for you and trusted by your system. If it wasn’t trusted, would the next time you boot the kernel won’t load because the bootloader will refuse to load the unsigned code.
The package manager doesn’t have special permission. The new kernel you download is also signed for you and trusted by your system.
If it wasn’t trusted, would the next time you boot the kernel won’t load because the bootloader will refuse to load the unsigned code.