Home >System Tutorial >Windows Series >Win11 Dev channel test 24H2 version 26080.1300 cumulative update patch KB5037139
php editor Zimo brings you details of the latest Win11 Dev channel test 24H2 version 26080.1300 cumulative update patch KB5037139. This update brings many improvements and fixes to the Win11 system, improving system stability and performance. Learn more about updates now and keep your system up to date!
According to reports, most people in the Dev channel will receive the 26080.1300 cumulative update (KB5037139), but if the virtualization-based security (VBS) feature is turned on, they will receive Build 26080.1400 (KB5037140). Microsoft also emphasized that Arm64 devices will only receive KB5037139 even if VBS is turned on.
Note: Virtualization-based security (VBS) uses hardware virtualization and the Windows hypervisor to create an independent virtual environment that becomes the target of a hypothetical kernel attack. Root of trust to the compromised OS. Windows uses this isolated environment to host many security solutions, providing them with significantly enhanced protection against vulnerabilities in the operating system and against malicious attacks seeking to subvert protection. VBS enforces restrictions to protect critical system and operating system resources, or to protect security assets such as authenticated user credentials.
One of the security solutions is Memory Integrity, which protects and hardens Windows by running kernel-mode code integrity in an isolated virtual environment in VBS. Kernel-mode code integrity refers to a Windows process that checks all kernel-mode drivers and binaries before they are launched and prevents unsigned or untrusted drivers or system files from being loaded into system memory. Memory integrity also limits the kernel memory allocations that can be used to compromise the system, ensuring that kernel memory pages become executable only after passing code integrity checks in the secure runtime environment, and that the executable pages themselves are never writable. This way, even if there is a vulnerability such as a buffer overflow that allows malware to attempt to modify memory, the executable code page cannot be modified, and the modified memory cannot be executed.
The above is the detailed content of Win11 Dev channel test 24H2 version 26080.1300 cumulative update patch KB5037139. For more information, please follow other related articles on the PHP Chinese website!