• MonkderVierte@lemmy.ml
    link
    fedilink
    English
    arrow-up
    97
    arrow-down
    5
    ·
    2 days ago

    Misleading title. It was installed by a third-party updater, Heimdall, but MS labeled a Windows 11 update wrong.

      • ditty@lemm.ee
        link
        fedilink
        English
        arrow-up
        30
        arrow-down
        2
        ·
        1 day ago

        Yet another reason to not do auto-updates in an enterprise environment for mission-critical services.

        • superkret@feddit.orgOP
          link
          fedilink
          English
          arrow-up
          39
          arrow-down
          1
          ·
          1 day ago

          In an enterprise environment, you rely on a service that tracks CVEs, analyzes which ones apply to your environment, and prioritizes security critical updates.
          The issue here is that one of these services installed a release upgrade because Microsoft mislabelled it as security update.

            • SomeGuy69@lemmy.world
              link
              fedilink
              English
              arrow-up
              11
              arrow-down
              1
              ·
              1 day ago

              For security updates in critical infrastructure, no. You want that right away, in best case instant. You can’t risk a zero day being used to kill people.

              • Appoxo@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                2
                ·
                19 hours ago

                Even security updates can be uncritical or supercritical. Conault the patch notes or get burned lol

            • mosiacmango@lemm.ee
              link
              fedilink
              English
              arrow-up
              10
              ·
              edit-2
              1 day ago

              Pre-prod is ideal, but a pipe dream for many. Lots of folks barely get prod.

              We still stagger patching so things like this only wipe some of the critical infrastructure, but that still causes needless issues.

      • Appoxo@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        2
        ·
        19 hours ago

        Do you know that’s nor a mistake and done fully malicously knowing that? Please give me your source.

          • Appoxo@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            8 hours ago

            And you make absolutely no error?

            Besides tbat:
            Should MS have caught the errorenous ID (assuming it truly was errourneous and not knowingly falsely labeled)? Absolutely. Should the patch management team blindly release all updates that MS releases? No?