• MonkderVierte@lemmy.ml
    link
    fedilink
    English
    arrow-up
    100
    arrow-down
    5
    ·
    11 days ago

    Misleading title. It was installed by a third-party updater, Heimdall, but MS labeled a Windows 11 update wrong.

      • ditty@lemm.ee
        link
        fedilink
        English
        arrow-up
        31
        arrow-down
        4
        ·
        11 days ago

        Yet another reason to not do auto-updates in an enterprise environment for mission-critical services.

        • superkret@feddit.orgOP
          link
          fedilink
          English
          arrow-up
          42
          arrow-down
          1
          ·
          11 days ago

          In an enterprise environment, you rely on a service that tracks CVEs, analyzes which ones apply to your environment, and prioritizes security critical updates.
          The issue here is that one of these services installed a release upgrade because Microsoft mislabelled it as security update.

          • NocturnalEngineer@lemmy.world
            link
            fedilink
            English
            arrow-up
            15
            arrow-down
            3
            ·
            11 days ago

            Should still be doing phased rollouts of any patches, and where possible, implementing them on pre-prod first.

            • mosiacmango@lemm.ee
              link
              fedilink
              English
              arrow-up
              11
              ·
              edit-2
              11 days ago

              Pre-prod is ideal, but a pipe dream for many. Lots of folks barely get prod.

              We still stagger patching so things like this only wipe some of the critical infrastructure, but that still causes needless issues.

            • SomeGuy69@lemmy.world
              link
              fedilink
              English
              arrow-up
              12
              arrow-down
              1
              ·
              11 days ago

              For security updates in critical infrastructure, no. You want that right away, in best case instant. You can’t risk a zero day being used to kill people.

              • Appoxo@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                2
                ·
                edit-2
                8 days ago

                Even security updates can be uncritical or supercritical. Consult the patch notes or get burned lol

      • Appoxo@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        4
        ·
        edit-2
        8 days ago

        Do you know that’s not a mistake and done fully malicously knowing that? Please give me your source.

          • Appoxo@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            4
            ·
            edit-2
            8 days ago

            And you make absolutely no error?

            Besides that:
            Should MS have caught the errorenous ID (assuming it truly was errourneous and not knowingly falsely labeled)? Absolutely. Should the patch management team blindly release all updates that MS releases? No?