Newsletter Archives

  • April’s deluge of patches

    PATCH WATCH

    Susan Bradley

    By Susan Bradley

    It’s a good thing we no longer receive individual updates fixing each unique vulnerability. If we did, we’d be calling “uncle” right about now.

    Historically, the number of patches released each April tends to be large. I attribute this to the final end of the holiday slump, when the folks at Microsoft are back up to full steam and working on fixes with gusto.

    This time around, there are 124 vulnerabilities in Windows, Office, Azure, .NET, Visual Studio, BitLocker, Kerberos, Windows Hello, OpenSSH, and Windows’ Lightweight Directory Access Protocol (LDAP).

    Read the full story in our Plus Newsletter (22.15.0, 2025-04-14).

  • WinRE KB5057589 fake out

    Error messagePK noted this behavior the other day (if I am recalling correctly) where the installation of the KB5057589 patch looks like it failed, but it really doesn’t.

    “This error is observed when the device installs the WinRE update when there is another update in a pending reboot state. Although the error message suggests the update did not complete, the WinRE update is typically applied successfully after the device restarts. Windows Update might continue to display the update as failed until the next daily scan, at which point the update is no longer offered and the failure message is cleared automatically.”

    Sigh.

    So if you get an install failure, you may not have an install failure, unless you really do have an install failure. My take: In a consumer setting the risk of issues of side effects of installing updates are often greater than the risk of attacks.