Huawei came under fire due to a toothless Linux kernel patch

| |

The patch, which contains “trivially exploitable” vulnerabilities, the company said was published by an employee as a private individual. Named HKSP (Huawei Kernel Self Protection), the patch was designed to improve kernel security, but security experts said it contained trivial exploits. The Chinese giant quickly caught fire because of the case, which was not helped by the company's heavily battered reputation in the United States last year.
            Docler Holding is looking for the best Hungarian developers in the IT sector with outstanding salaries – not only in domestic offices.
            

Docler seeks 100 new developers with up to 2.5 million salaries (x)
        Docler Holding is looking for the best Hungarian developers in the IT sector with outstanding salaries – not only in domestic offices.
        

Huawei quickly issued a statement regarding the patch, rejecting the allegations against it and also emphasizing that the company did not participate in the project or use the HKSP code in its own products. According to the company, his employee, as an individual, uploaded suggestions for the kernel, for which he sought opinions from industry experts.

For the time being, it is highly questionable whether the company actually tried to smuggle backdoor into the kernel, mainly after the patch it should also have undergone a round of revision before approval. However, the fact that the statement separating the code from Huawei in the relevant GitHub repository was dated back to before the scandal erupted – or that the patch was published by a developer with the highest security rating available within the company – does not bode well for the company. from which the community would not expect security-poor code.

Previous

Linux apps with GUI also come for Windows WSL

Windows Terminal 1.0 has arrived

Next