{"id":203429,"date":"2018-04-18T02:04:39","date_gmt":"2018-04-18T00:04:39","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=203429"},"modified":"2023-06-01T00:58:59","modified_gmt":"2023-05-31T22:58:59","slug":"windows-7-8-1-preview-rollup-updates-17-04-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/04\/18\/windows-7-8-1-preview-rollup-updates-17-04-2018\/","title":{"rendered":"Windows 7\/8.1 Preview Rollup Updates (17.04.2018)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" title=\"Update\" style=\"border-left-width: 0px; border-right-width: 0px; border-bottom-width: 0px; float: left; margin: 0px 10px 0px 0px; display: inline; border-top-width: 0px\" border=\"0\" alt=\"Windows Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" width=\"54\" align=\"left\" height=\"54\"\/>[<a href=\"https:\/\/borncity.com\/win\/2018\/04\/18\/windows-7-8-1-preview-rollup-updates-04-17-2018\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Zum 17. April 2018 hat Microsoft Updates f\u00fcr Windows 7 (KB4093113), Windows 8.1 (KB4093121) und die betreffenden Server-Pendants freigegeben. Es handelt sich um die monatlichen Preview Rollup Updates. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/54eeab22425249c3ac7b21c4643ab247\" width=\"1\" height=\"1\"\/>Preview Rollup Updates bedeutet eine Vorschau auf Updates, die zum Patchday des Folgemonats erscheinen. Diese optionalen Updates brauchen eigentlich nicht installiert zu werden (es sei denn, man ist von einem gefixten Bug betroffen). <\/p>\n<p>\u00c4hnlich wie bei den Sicherheitsupdates vom 14. April 2018 h\u00e4ngt die Update-Installation nicht mehr vom Registrierungseintrag <em>cadca5fe-87d3-4b96-b7fb-a231484277cc<\/em> im Zweig <\/p>\n<p>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\QualityCompat\\<\/p>\n<p>(mit dem die Antivirus-Kompatibilit\u00e4t signalisiert wird) ab, sondern die Updates werden \u00fcber Windows Update und WSUS angeboten. <\/p>\n<h2>KB4093113 f\u00fcr Windows 7\/Windows Server 2008 R2<\/h2>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4093113\/windows-7-update-kb4093113\" target=\"_blank\" rel=\"noopener\">KB4093113<\/a> steht f\u00fcr Windows 7 Service Pack 1 und Windows Server 2008 R2 Service Pack 1 als Preview of Monthly Rollup bereit. Es handelt sich nicht um ein Sicherheitsupdate, welches folgende Probleme adressiert:<\/p>\n<ul>\n<li>Addresses additional issues with updated time zone information.  <\/li>\n<li>Addresses a stop error that occurred when the previous month's update was applied to 32-bit (x86) computers with Physical Address Extension (PAE) mode disabled.<\/li>\n<\/ul>\n<p>Insbesondere der gefixte PAE-Stop-Fehler in 32-Bit-Versionen von Windows 7 d\u00fcrfte einige Betroffene freuen. Das Update ist optional und kann auch per <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4093113\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> heruntergeladen und installiert werden. Da es ein Preview-Update ist, w\u00fcrde ich es nicht installieren (es sei denn, man ist vom PAE-Fehler betroffen). <\/p>\n<h3>Bekannte Probleme mit dem Update<\/h3>\n<p>Bei diesem Update ist weiterhin das SMB Memory Leak-Problem enthalten. Dieses tritt auf, wenn in SMB-Freigaben symbolische Links enthalten sind. Microsoft arbeitet an einem Fix, der Fehler zieht sich aber eine geraume Zeit durch Updates. Weiterhin tritt ein Stopp-Fehler auf Computern auf, die Streaming Single Instructions Multiple Data (SIMD) Extensions 2 (SSE2) nicht unterst\u00fctzen.<\/p>\n<h2>Update KB4099950 f\u00fcr Windows 7\/Server 2008 R2<\/h2>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4099950\/nic-settings-are-replaced-or-static-ip-address-settings-are-lost-after\" target=\"_blank\" rel=\"noopener\">KB4099950<\/a> wurde ebenfalls neu f\u00fcr Windows 7 Service Pack 1 und Windows Server 2008 R2 Service Pack 1 freigegeben. Es ist das Update, welches das Problem beheben soll, dass Netzwerkadapter (NICs)-Einstellungen ersetzt werden oder statische IP-Adresseneinstellungen verloren gehen, nachdem KB4088875 oder KB4088878 installiert wurde. Auch hier weist Microsoft darauf hin, dass dieses Update vor der Installation der Updates KB4088875 oder KB4088878 installiert werden muss. <\/p>\n<h2>Update KB4093121 f\u00fcr Windows 8.1\/Server 2012 R2<\/h2>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4093121\/windows-81-update-kb4093121\" target=\"_blank\" rel=\"noopener\">KB4093121<\/a> steht f\u00fcr Windows 8.1 und Windows Server 2012 R2 als Preview of Monthly Rollup bereit. Es handelt sich nicht um ein Sicherheitsupdate, welches folgende Probleme adressiert:<\/p>\n<ul>\n<li>\n<p>Addresses additional issues with updated time zone information.<\/p>\n<\/li>\n<li>\n<p>Addresses an issue that blocks failed NTLM authentications instead of only logging them when using an authentication policy with audit mode turned on. Netlogon.log may show the following:<\/p>\n<\/li>\n<\/ul>\n<p><code>SamLogon: Transitive Network logon of &lt;domain&gt;\\&lt;user&gt; from &lt;machine2&gt; (via &lt;machine1&gt;) Entered<\/code>  <\/p>\n<p><code>NlpVerifyAllowedToAuthenticate: AuthzAccessCheck failed for A2ATo 0x5. This can be due to the lack of claims and compound support in NTLM<\/code>  <\/p>\n<p><code>SamLogon: Transitive Network logon of &lt;domain&gt;\\&lt;user&gt; from &lt;machine2&gt; (via &lt;machine1&gt;) Returns 0xC0000413&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/code> <\/p>\n<ul>\n<li>\n<p>Addresses an issue that generates a certificate validation error 0x800B0109 (CERT_E_UNTRUSTEDROOT) from http.sys.<\/p>\n<\/li>\n<li>\n<p>Addresses a race condition in iSCSI that might lead to queries that return incomplete sense data.<\/p>\n<\/li>\n<li>\n<p>Addresses an issue that causes massive pool commit failures (ID 2019 and ID 2020) to occur when using dedupe and backup on large file servers.<\/p>\n<\/li>\n<li>\n<p>Addresses an issue that causes a communication failure in an RPC-based network in certain situations. The error is \"reason_not_specified_reject\".<\/p>\n<\/li>\n<li>\n<p>Addresses an issue that might cause Windows Server 2012 R2 Domain Controllers (DC) to periodically restart after a Local Security Authority Subsystem Service (LSASS) module fault. This interrupts applications and services bound to the DC. DCs may log the following events:  <\/p>\n<ul>\n<li>\n<p>Application Error event ID 1000; the faulty module is NTDSATQ.dll<strong>,<\/strong> and the exception code is \"0xc0000005\".<\/p>\n<\/li>\n<li>\n<p>User32 event ID 1074; Microsoft-Windows-Wininit event ID 1015 indicates that a critical system process, lsass.exe, failed with status code 255.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/p>\n<\/li>\n<\/ul>\n<li>\n<p>Addresses an issue that causes DTC to stop responding in msdtcprx!CIConnSink::SendReceive during an XA recovery. During this failure, IXaMapper objects with identical RMIDs are corrupted.<\/p>\n<\/li>\n<li>\n<p>Addresses an issue that causes Eventcollector subscription to fail in cross-forest environments when the target's FQDN label doesn't match the domain's NetBIOS name.<\/p>\n<\/li>\n<li>Addresses an issue that might cause clients that use CSVs to disconnect from SMB3 servers because srv2.sys doesn't use SMB3 multichannel for recovery. When there are disconnections between nodes, this can cause unexpected failover of the CSVs and creates instability in the VMs located on those CSVs. The disconnections are detected as I\/O timeouts and generate Event ID 5120 with \"STATUS_IO_TIMEOUT\". Sometimes Event ID 5142 appears when recovery doesn't occur.<\/li>\n<\/li>\n<\/ul>\n<p>Das Update wird unabh\u00e4ngig von der Registrierungspr\u00fcfung auf kompatible Antivirus-L\u00f6sungen angeboten und installiert. Die Verteilung erfolgt per Windows Update oder im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4093121\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. Probleme sind keine bekannt. <\/p>\n<p><strong>\u00c4hnliche Artikel:<br \/><\/strong><a href=\"https:\/\/borncity.com\/blog\/2018\/04\/04\/microsoft-office-patchday-3-april-2018\/\">Microsoft Office Patchday (3. April 2018)<\/a><br \/>Adobe Flash Player Update auf Version 29.0.0.140<br \/><a href=\"https:\/\/borncity.com\/blog\/2018\/04\/10\/microsoft-patchday-summary-10-april-2018\/\">Microsoft Patchday Summary 10. April 2018<\/a><br \/><a href=\"https:\/\/borncity.com\/blog\/2018\/04\/10\/patchday-windows-10-updates-10-april-2018\/\">Patchday: Windows 10-Updates 10. April 2018<\/a><br \/><a href=\"https:\/\/borncity.com\/blog\/2018\/04\/11\/patchday-updates-fr-windows-7-8-1-server-mrz-2018\/\">Patchday: Updates f\u00fcr Windows 7\/8.1\/Server April 2018<\/a><br \/><a href=\"https:\/\/borncity.com\/blog\/2018\/04\/11\/patchday-microsoft-office-updates-10-april-2018\/\">Patchday Microsoft Office Updates (10. April 2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/blog\/2018\/04\/12\/patchday-weitere-microsoft-updates-zum-10-april-2018\/\">Patchday: Weitere Microsoft Updates zum 10. April 2018<\/a>  <\/p>\n<p><a href=\"https:\/\/borncity.com\/blog\/2018\/04\/11\/windows-7-8-1-updates-kb2952664-kb2976978-10-04-2018\/\">Windows 7\/8.1 Updates KB2952664\/KB2976978 (10.04.2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/blog\/2018\/04\/18\/windows-7-8-1-preview-rollup-updates-17-04-2018\/\">Windows 7\/8.1 Preview Rollup Updates (17.04.2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/blog\/2018\/04\/18\/windows-updates-kb4093117-und-kb4093120-17-04-2018\/\">Windows Updates KB4093117 und KB4093120 (17.04.2018)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Zum 17. April 2018 hat Microsoft Updates f\u00fcr Windows 7 (KB4093113), Windows 8.1 (KB4093121) und die betreffenden Server-Pendants freigegeben. Es handelt sich um die monatlichen Preview Rollup Updates.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185,2557],"tags":[6952,6953,6926,4315,4294,4366],"class_list":["post-203429","post","type-post","status-publish","format-standard","hentry","category-update","category-windows-server","tag-kb4093113","tag-kb4093121","tag-kb4099950","tag-update","tag-windows-7","tag-windows-8-1"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/203429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=203429"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/203429\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=203429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=203429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=203429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}