{"id":205478,"date":"2018-06-12T23:36:14","date_gmt":"2018-06-12T21:36:14","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=205478"},"modified":"2024-10-04T21:08:23","modified_gmt":"2024-10-04T19:08:23","slug":"patchday-updates-fr-windows-7-8-1-server-juni-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/06\/12\/patchday-updates-fr-windows-7-8-1-server-juni-2018\/","title":{"rendered":"Patchday: Updates f&uuml;r Windows 7\/8.1\/Server Juni 2018"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"54\" height=\"54\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/borncity.com\/win\/2018\/06\/12\/patchday-june-2018-updates-for-windows-7-8-1-server\/\" target=\"_blank\" rel=\"noopener noreferrer\">English<\/a>]Am 12. Juni 2018 hat Microsoft diverse (Sicherheits-)Updates (KB4284826,\u00a0 KB4284867) f\u00fcr Windows 7 SP1 und weitere Updates (KB4284815, KB4284878) f\u00fcr Windows 8.1 sowie die korrespondierenden Server-Versionen freigegeben. Hier der \u00dcberblick \u00fcber diese Updates.<\/p>\n<p><!--more--><\/p>\n<h2>Updates f\u00fcr Windows 7\/Windows Server 2008 R2<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/97d86a48a6284d188bc54d6520848660\" alt=\"\" width=\"1\" height=\"1\" \/>F\u00fcr Windows 7 SP1 und Windows Server 2008 R2 SP1 wurden ein Rollup und ein Security-only Update freigegeben. Die Update-Historie f\u00fcr Windows 7 ist auf <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4009469\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Microsoft-Seite<\/a> zu finden.<\/p>\n<h3>KB4284826 (Monthly Rollup) f\u00fcr Windows 7\/Windows Server 2008 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4284826\" target=\"_blank\" rel=\"noopener noreferrer\">KB4284826<\/a> (June 12, 2018, Monthly Quality Rollup for Windows 7 SP1 and Windows Server 2008 R2 SP1) enth\u00e4lt Verbesserungen und Bug-Fixes, die bereits im Update vom Vormonat enthalten waren. Das Update adressiert unter anderem die Spectre-Sicherheitsl\u00fccken bzw. Folgendes:<\/p>\n<ul>\n<li>Provides support to control use of Indirect Branch Prediction Barrier (IBPB) on some AMD processors (CPUs) for mitigating CVE-2017-5715, Spectre Variant 2 when switching from user context to kernel context. (See <a href=\"https:\/\/web.archive.org\/web\/20221208231912\/http:\/\/developer.amd.com\/wp-content\/resources\/Architecture_Guidelines_Update_Indirect_Branch_Control.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">AMD Architecture Guidelines for Indirect Branch Control<\/a> and  for more details). For Windows client (IT pro) guidance, follow the instructions in <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\" target=\"_blank\" rel=\"noopener noreferrer\">KB4073119<\/a>. For Windows Server guidance, follow the instructions in <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\" target=\"_blank\" rel=\"noopener noreferrer\">KB4072698<\/a>. Use these guidance documents to enable use of IBPB on some AMD processors (CPUs) for mitigating Spectre Variant 2 when switching from user context to kernel context.<\/li>\n<li>Provides protections from an additional subclass of speculative execution side channel vulnerability known as <a href=\"https:\/\/web.archive.org\/web\/20190118032455\/https:\/\/blogs.technet.microsoft.com\/srd\/2018\/05\/21\/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639\/\" target=\"_blank\" rel=\"noopener noreferrer\">Speculative Store Bypass<\/a> (CVE-2018-3639). These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\" target=\"_blank\" rel=\"noopener noreferrer\">KB4073119<\/a>. For Windows Server guidance, follow the instructions in <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\" target=\"_blank\" rel=\"noopener noreferrer\">KB4072698<\/a>. Use this guidance document to enable mitigations for Speculative Store Bypass (CVE-2018-3639) in addition to the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).<\/li>\n<li>Increased the Internet Explorer cookie limit from 50 to better align with industry standards.<\/li>\n<li>Improves the reliability of Internet Explorer when using geolocation.<\/li>\n<li>Security updates to Internet Explorer, Windows apps, Windows Server, Windows storage and filesystems, Windows wireless networking, and Windows virtualization and kernel.<\/li>\n<\/ul>\n<p>Das Update wird automatisch von Windows Update heruntergeladen und installiert. Es ist aber auch \u00fcber den <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4284826\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a> herunterladbar. Microsoft gibt nach wie vor ein bekanntes Problem an: Ein Stopp-Fehler tritt auf Computern auf, die Streaming Single Instructions Multiple Data (SIMD) Extensions 2 (SSE2) nicht unterst\u00fctzen. Das soll irgendwann gefixt werden.<\/p>\n<p>Auch das zweite Problem ist seit Monaten bekannt: Es gibt ein Problem mit Windows und Software von Drittanbietern, das sich auf eine fehlende Datei bezieht (oem&lt;number&gt;.inf). Aus diesem Grund wird der Netzwerk-Interface-Controller nach der Installation dieses Updates nicht mehr funktionieren. Ich habe das Thema im Blog-Beitrag <a href=\"https:\/\/borncity.com\/blog\/2018\/05\/15\/windows-7-sp1-netzwerk-bug-durch-kb4103718-kb4103712\/\">Windows 7 SP1: Netzwerk-Bug durch KB4103718\/KB4103712<\/a> aufgegriffen. Microsoft empfiehlt als Workaround, den Netzwerktreiber aktualisieren zu lassen.<\/p>\n<h3>KB4284867 (Security Only) f\u00fcr Windows 7\/Windows Server 2008 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4284867\" target=\"_blank\" rel=\"noopener noreferrer\">KB4284867<\/a> (Security-only update) steht f\u00fcr Windows 7 SP1 und Windows Server 2008 R2 SP1 zur Verf\u00fcgung. Das Update adressiert die gleichen Punkte, wie sie bei KB4103718 aufgef\u00fchrt wurden. Auch der beschriebene Stopp-Fehler tritt auf. Das Update gibt es per WSUS oder im <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4284867\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a>. Bei Installation des Security Only Update auch\u00a0KB4230450 f\u00fcr den IE installieren.<\/p>\n<h2>Updates f\u00fcr Windows 8.1\/Windows Server 2012 R2<\/h2>\n<p>F\u00fcr Windows 8.1 und Windows Server 2012 R2 wurden ein Rollup und ein Security-only Update freigegeben. Die Update-Historie f\u00fcr Windows 8.1 ist auf <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4009470\/windows-8-1-windows-server-2012-r2-update-history\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Microsoft-Seite<\/a> zu finden.<\/p>\n<h3>KB4284815 (Monthly Rollup) f\u00fcr Windows 8.1\/Server 2012 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4284815\" target=\"_blank\" rel=\"noopener noreferrer\">KB4284815<\/a> (Monthly Rollup for Windows 8.1 and Windows Server 2012 R2) enth\u00e4lt Verbesserungen und Fixes, die im Rollup des Vormonats enthalten waren. Zudem adressiert es die folgenden Punkte.<\/p>\n<ul>\n<li>Addresses an issue where firmware updates cause devices to go into BitLocker recovery mode when BitLocker is enabled, but Secure Boot is disabled or not present. This update prevents firmware installation on devices in this state. Administrators can install firmware updates by:\n<ul>\n<li>1. Temporarily suspending BitLocker.<\/li>\n<li>2. Immediately installing firmware updates before the next OS startup.<\/li>\n<li>3. Immediately restarting the device so that BitLocker doesn't remain in the suspended state.<\/li>\n<\/ul>\n<\/li>\n<li>Permits a band-capable disk that has only one partition, and it is an MSR partition, to convert to a dynamic disk.<\/li>\n<li>Increases the Internet Explorer cookie limit from 50 to better align with industry standards.<\/li>\n<li>Improves the reliability of Internet Explorer when using geolocation.<\/li>\n<li>Security updates to Internet Explorer, Windows apps, remote code execution, Windows Server, Windows storage and filesystems, and Windows wireless networking.<\/li>\n<\/ul>\n<p>Dieses Update wird automatisch von Windows Update heruntergeladen und installiert, ist aber auch im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4284815\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a> erh\u00e4ltlich. Probleme sind mit dem Update keine bekannt.<\/p>\n<h3>KB4284878 (Security-only update) f\u00fcr Windows 8.1\/Server 2012 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4284878\" target=\"_blank\" rel=\"noopener noreferrer\">KB4284878<\/a> (Security Only Quality Update for Windows 8.1 and Windows Server 2012 R2) adressiert nur folgenden Punkt.<\/p>\n<blockquote><p>Security updates to Windows apps, remote code execution, Windows Server, Windows storage and filesystems, and Windows wireless networking.<\/p><\/blockquote>\n<p>Das Update gibt es per WSUS oder im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4284878\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a>. Fehler sind Microsoft momentan keine bekannt.\u00a0Bei Installation des Security Only Update auch\u00a0KB4230450 f\u00fcr den IE installieren.<\/p>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/>\nAdobe Flash Player: Update Version 30.0.0.113<br \/>\nWindows: Flash Player Update KB4287903 (7. Juni 2018)<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/06\/06\/windows-10-v1803-update-kb4338548-freigegeben\/\">Windows 10 V1803: Update KB4338548 freigegeben<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/06\/12\/windows-10-v1511-privacy-notification-update-kb4134662\/\">Windows 10 V1511-1607: Privacy-Notification Updates KB4134662, KB4134663 und KB4134659<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/06\/12\/zusammenfassung-der-microsoft-sicherheitsupdates-12-6-2018\/\">Zusammenfassung der Microsoft Sicherheitsupdates 12.6.2018<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20240224024009\/https:\/\/borncity.com\/blog\/2018\/06\/06\/microsoft-office-patchday-5-juni-2018\/\">Microsoft Office Patchday (5. Juni 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/06\/12\/patchday-updates-fr-windows-7-8-1-server-juni-2018\/\">Patchday: Updates f\u00fcr Windows 7\/8.1\/Server Juni 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/06\/13\/patchday-windows-10-updates-12-juni-2018\/\">Patchday: Windows 10-Updates 12. Juni 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/06\/13\/patchday-microsoft-office-updates-12-juni-2018\/\">Patchday Microsoft Office Updates (12. Juni 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/06\/13\/microsoft-patchday-weitere-updates-zum-12-juni-2018\/\">Microsoft Patchday: Weitere Updates zum 12. Juni 2018<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Am 12. Juni 2018 hat Microsoft diverse (Sicherheits-)Updates (KB4284826,\u00a0 KB4284867) f\u00fcr Windows 7 SP1 und weitere Updates (KB4284815, KB4284878) f\u00fcr Windows 8.1 sowie die korrespondierenden Server-Versionen freigegeben. Hier der \u00dcberblick \u00fcber diese Updates.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185,2557],"tags":[7046,7044,7045,7047,4315,4294,4366,4364],"class_list":["post-205478","post","type-post","status-publish","format-standard","hentry","category-update","category-windows-server","tag-kb4284815","tag-kb4284826","tag-kb4284867","tag-kb4284878","tag-update","tag-windows-7","tag-windows-8-1","tag-windows-server"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/205478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=205478"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/205478\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=205478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=205478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=205478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}