After #CyberMonday comes #PatchTuesday, naturally.

—> https://stickerthepla.net/#018 <—

Dark times call for glow-in-the-dark #SafetyThird patches with velcro backing. Incredible deals when you bundle up several: THREE for $29, or TEN for $69 USD.

Order today for bonus gifts for your sleigh. MOAR stocking-stuffers: https://stickerthepla.net
#PatchAllTheThings
#EPluribusStickerum

@jacques @bagder @gregkh I'd really love to have some public database that would help us all collectively make more efficient resource allocation decisions.

Let's take CVE-2025-38352 for example. CISA added it to the KEV because Google said that there is evidence of exploitation in the context of Android.

If you use CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y the fix is not needed.

Linux distros aren't affected but release "fixes" anyway. https://forums.rockylinux.org/t/rocky-8-10-cve-2025-38352/19590/3

#PatchAllTheThings! #InfoSec

Rocky 8.10 - CVE-2025-38352

OK, I’m busy waiting. Regarding Rocky 9: We also use a machine with kernel 5.14.0-570.37.1.el9. On this machine, the kernel parameter CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y is effective. If I understand correctly, this means that the problem does not occur. Regards

Rocky Linux Forum

Looks like today is, at least partially, patch day for the clown computing cluster.

Beginning the upgrade to #OpenBSD v7.6

#TechnicalJiggeryPokery
#PatchAllTheThings

Suck it, #CyberMonday. Today is #PatchTuesday!

—> https://stickerthepla.net/#006 <—

Velcro-backed #SafetyThird patches are $8 each or SIX for $29 USD. Order today for bonus gifts for your sleigh.

MOAR stocking-stuffers: stickerthepla.net
#PatchAllTheThings
#EPluribusStickerum

@jwgoerlich #PatchAllTheThings or "you could face jailtime" is a fantastic thing to tell your IT workforce.

And why not put the infosec people who also knew about the vulns and didnt say anything or didnt get a patch exception or risk acceptance from those folks?

Man thats some scary shit