{"id":206423,"date":"2018-07-11T00:42:00","date_gmt":"2018-07-10T22:42:00","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=206423"},"modified":"2023-05-15T17:14:15","modified_gmt":"2023-05-15T15:14:15","slug":"patchday-updates-fr-windows-7-8-1-server-juli-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/07\/11\/patchday-updates-fr-windows-7-8-1-server-juli-2018\/","title":{"rendered":"Patchday: Updates f&uuml;r Windows 7\/8.1\/Server Juli 2018"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"54\" height=\"54\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/borncity.com\/win\/2018\/07\/11\/patchday-updates-for-windows-7-8-1-server-july-2018\/\" target=\"_blank\" rel=\"noopener noreferrer\">English<\/a>]Am 10. Juli 2018 hat Microsoft diverse (Sicherheits-)Updates (KB4338818,\u00a0 KB4338823) f\u00fcr Windows 7 SP1 und weitere Updates (KB4338815, KB4338824) f\u00fcr Windows 8.1 sowie die korrespondierenden Server-Versionen freigegeben. Hier der \u00dcberblick \u00fcber diese Updates.<\/p>\n<p><!--more--><\/p>\n<h2>Updates f\u00fcr Windows 7\/Windows Server 2008 R2<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/7a737b861403474a86a6a04f17dfd539\" alt=\"\" width=\"1\" height=\"1\" \/>F\u00fcr Windows 7 SP1 und Windows Server 2008 R2 SP1 wurden ein Rollup und ein Security-only Update freigegeben. Die Update-Historie f\u00fcr Windows 7 ist auf <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4009469\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Microsoft-Seite<\/a> zu finden.<\/p>\n<h3>KB4338818 (Monthly Rollup) f\u00fcr Windows 7\/Windows Server 2008 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4338818\" target=\"_blank\" rel=\"noopener noreferrer\">KB44338818<\/a> (July 10, 2018, Monthly Quality Rollup for Windows 7 SP1 and Windows Server 2008 R2 SP1) enth\u00e4lt Verbesserungen und Bug-Fixes, die bereits im Update vom Vormonat enthalten waren. Das Update adressiert folgendes:<\/p>\n<ul>\n<li>Provides protections for an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV180016\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-3665<\/a>) for 64-Bit (x64) versions of Windows.<\/li>\n<li>Updates Internet Explorer's Inspect Element feature to conform to the policy that disables the launch of Developer Tools.<\/li>\n<li>Addresses an issue where DNS requests disregard proxy configurations in Internet Explorer and Microsoft Edge.<\/li>\n<li>Security updates to Internet Explorer, Windows apps, Windows graphics, Windows Shell, Windows datacenter networking, Windows wireless networking, and Windows virtualization.<\/li>\n<\/ul>\n<p>Das Update wird automatisch von Windows Update heruntergeladen und installiert. Es ist aber auch \u00fcber den <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4338818\">Microsoft Update Catalog<\/a> herunterladbar. Das Update hat das seit vielen Monaten bekannt Problem, dass der NIC (network interface controller) wegen einer fehlenden Dritthersteller .inf-Datei nicht mehr funktioniert. Abhilfe schafft, den NIC \u00fcber den Ger\u00e4te-Manager neu installieren zu lassen.<\/p>\n<blockquote><p>Beachtet meinen Blog-Beitrag <a href=\"https:\/\/borncity.com\/blog\/2018\/07\/13\/kb4018385-zurckgezogen-weitere-patchday-probleme\/\" target=\"_blank\" rel=\"noopener noreferrer\">hier<\/a> zu Problemen mit Exchange Server 2010 SP3.<\/p><\/blockquote>\n<h3>KB4338823 (Security Only) f\u00fcr Windows 7\/Windows Server 2008 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4338823\" target=\"_blank\" rel=\"noopener noreferrer\">KB4338823<\/a> (Security-only update) steht f\u00fcr Windows 7 SP1 und Windows Server 2008 R2 SP1 zur Verf\u00fcgung. Das Update adressiert folgende Punkte:<\/p>\n<ul>\n<li>Provides protections for an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV180016\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-3665<\/a>) for 64-Bit (x64) versions of Windows.<\/li>\n<li>Security updates to Windows apps, Windows graphics, Windows Shell, Windows datacenter networking, Windows wireless networking, and Windows virtualization.<\/li>\n<\/ul>\n<p>Das Update gibt es per WSUS oder im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4338823\">Microsoft Update Catalog<\/a>. Probleme sind keine bekannt. Bei Installation des Security Only Update ist auch KB4339093 f\u00fcr den IE zu installieren.<\/p>\n<h3>Erg\u00e4nzung: Kompatibilit\u00e4tsupdate KB2952664 f\u00fcr Windows 7<\/h3>\n<p>Auf meiner Maschine wird mir auch das\u00a0Kompatibilit\u00e4tsupdate <a href=\"https:\/\/support.microsoft.com\/de-de\/help\/2952664\/compatibility-update-for-keeping-windows-up-to-date-in-windows-7\" target=\"_blank\" rel=\"noopener noreferrer\">KB2952664<\/a> f\u00fcr Windows 7 angeboten. Microsoft schreibt dazu:<\/p>\n<blockquote><p>Dieses Update f\u00fchrt Diagnosen auf Windows-Systemen durch, die am Windows Customer Experience Improvement-Programm teilnehmen. Die Diagnose Kompatibilit\u00e4tsstatus im Windows-\u00d6kosystem auswerten und die Microsoft Anwendung und Ger\u00e4tekompatibilit\u00e4t f\u00fcr alle Windows-Updates. Es ist keine GWX oder Upgradefunktion in diesem Update enthalten.<\/p><\/blockquote>\n<p>Das Update wird \u00fcber Windows Update verteilt und ist als wichtig klassifiziert. Es l\u00e4sst sich auch aus dem\u00a0\u00a0<a id=\"kb-link-2\" href=\"http:\/\/www.catalog.update.microsoft.com\/search.aspx?q=kb2952664\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update-Katalog<\/a>\u00a0herunterladen. Angesichts der Erfahrungen wie im Blog-Beitrag\u00a0<a href=\"https:\/\/borncity.com\/blog\/2018\/04\/28\/windows-7-update-kb2952664-lsst-sich-nicht-deinstallieren\/\" target=\"_blank\" rel=\"noopener noreferrer\">Windows 7: Update KB2952664 l\u00e4sst sich nicht deinstallieren<\/a> beschrieben, w\u00fcrde ich dieses Update ausblenden.<\/p>\n<blockquote><p>Erg\u00e4nzung: Einigen Nutzern wird auch das Kompatibilit\u00e4tsupdate\u00a0<a href=\"https:\/\/support.microsoft.com\/de-de\/help\/3150513\/latest-compatibility-definition-update-for-windows\" target=\"_blank\" rel=\"noopener noreferrer\">KB3150513<\/a>\u00a0angeboten, welches inzwischen von Windows 7 \u00fcber Windows 8.1 bis Windows 10 verteilt wird.<\/p><\/blockquote>\n<h2>Updates f\u00fcr Windows 8.1\/Windows Server 2012 R2<\/h2>\n<p>F\u00fcr Windows 8.1 und Windows Server 2012 R2 wurden ein Rollup und ein Security-only Update freigegeben. Die Update-Historie f\u00fcr Windows 8.1 ist auf <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4009470\/windows-8-1-windows-server-2012-r2-update-history\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Microsoft-Seite<\/a> zu finden.<\/p>\n<h3>KB4338815 (Monthly Rollup) f\u00fcr Windows 8.1\/Server 2012 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4338815\" target=\"_blank\" rel=\"noopener noreferrer\">KB4338815<\/a> (Monthly Rollup for Windows 8.1 and Windows Server 2012 R2) enth\u00e4lt Verbesserungen und Fixes, die im Rollup des Vormonats enthalten waren. Zudem adressiert es die folgenden Punkte.<\/p>\n<ul>\n<li>Provides protections from an additional subclass of speculative execution side-channel vulnerability known as <a href=\"https:\/\/web.archive.org\/web\/20190118032455\/https:\/\/blogs.technet.microsoft.com\/srd\/2018\/05\/21\/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639\/\" target=\"_blank\" rel=\"noopener noreferrer\">Speculative Store Bypass<\/a> (CVE-2018-3639). These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\" target=\"_blank\" rel=\"noopener noreferrer\">KB4073119<\/a>. For Windows Server guidance, follow the instructions in <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\" target=\"_blank\" rel=\"noopener noreferrer\">KB4072698<\/a>. Use this guidance document to enable mitigations for Speculative Store Bypass (CVE-2018-3639) in addition to the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).<\/li>\n<li>Provides support to control usage of Indirect Branch Prediction Barrier (IBPB) on some AMD processors (CPUs) for mitigating CVE-2017-5715, Spectre Variant 2 when switching from user context to kernel context. (See <a href=\"https:\/\/web.archive.org\/web\/20221208231912\/http:\/\/developer.amd.com\/wp-content\/resources\/Architecture_Guidelines_Update_Indirect_Branch_Control.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">AMD Architecture Guidelines for Indirect Branch Control<\/a> and  for more details). For Windows client (IT pro) guidance, follow the instructions in <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\" target=\"_blank\" rel=\"noopener noreferrer\">KB4073119<\/a>. Use this guidance document to enable IBPB on some AMD processors (CPUs) for mitigating Spectre Variant 2 when switching from user context to kernel context.<\/li>\n<li>Provides protections for an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV180016\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-3665<\/a>) for 64-Bit (x64) versions of Windows.<\/li>\n<li>Updates Internet Explorer's Inspect Element feature to conform to the policy that disables the launch of Developer Tools.<\/li>\n<li>Addresses an issue where DNS requests disregard proxy configurations in Internet Explorer and Microsoft Edge.<\/li>\n<li>Addresses an issue that causes the mouse to stop working after a user switches between local and remote sessions.<\/li>\n<li>Security updates to Internet Explorer, Windows apps, Windows graphics, Windows Shell, Windows datacenter networking, Windows virtualization, and Windows kernel.<\/li>\n<\/ul>\n<p>Dieses Update wird automatisch von Windows Update heruntergeladen und installiert, ist aber auch im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4338815\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a> erh\u00e4ltlich. Probleme sind mit dem Update keine bekannt.<\/p>\n<h3>KB4338824 (Security-only update) f\u00fcr Windows 8.1\/Server 2012 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4338824\" target=\"_blank\" rel=\"noopener noreferrer\">KB4338824<\/a> (Security Only Quality Update for Windows 8.1 and Windows Server 2012 R2) adressiert folgende Punkte.<\/p>\n<ul>\n<li>Provides protections from an additional subclass of speculative execution side-channel vulnerability known as <a href=\"https:\/\/web.archive.org\/web\/20190118032455\/https:\/\/blogs.technet.microsoft.com\/srd\/2018\/05\/21\/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639\/\" target=\"_blank\" rel=\"noopener noreferrer\">Speculative Store Bypass<\/a> (CVE-2018-3639). These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\" target=\"_blank\" rel=\"noopener noreferrer\">KB4073119<\/a>. For Windows Server guidance, follow the instructions in <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\" target=\"_blank\" rel=\"noopener noreferrer\">KB4072698<\/a>. Use this guidance document to enable mitigations for Speculative Store Bypass (CVE-2018-3639) in addition to the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).<\/li>\n<li>Provides support to control usage of Indirect Branch Prediction Barrier (IBPB) on some AMD processors (CPUs) for mitigating CVE-2017-5715, Spectre Variant 2 when switching from user context to kernel context. (See <a href=\"https:\/\/web.archive.org\/web\/20221208231912\/http:\/\/developer.amd.com\/wp-content\/resources\/Architecture_Guidelines_Update_Indirect_Branch_Control.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">AMD Architecture Guidelines for Indirect Branch Control<\/a> and  for more details). For Windows client (IT pro) guidance, follow the instructions in <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\" target=\"_blank\" rel=\"noopener noreferrer\">KB4073119<\/a>. Use this guidance document to enable IBPB on some AMD processors (CPUs) for mitigating Spectre Variant 2 when switching from user context to kernel context.<\/li>\n<li>Provides protections for an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV180016\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-3665<\/a>) for 64-Bit (x64) versions of Windows.<\/li>\n<li>Security updates to Windows apps, Windows graphics, Windows Shell, Windows datacenter networking, Windows virtualization, and Windows kernel.<\/li>\n<\/ul>\n<p>Das Update gibt es per WSUS oder im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4338824\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a>. Fehler sind Microsoft momentan keine bekannt. Bei Installation des Security Only Update ist auch KB4339093 f\u00fcr den IE zu installieren.<\/p>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/>\nAdobe Flash Player: Update Version 30.0.0.134<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/07\/03\/microsoft-office-patchday-3-juli-2018\/\">Microsoft Office Patchday (3. Juli 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/07\/10\/patchday-windows-10-updates-10-juli-2018\/\">Patchday: Windows 10-Updates 10. Juli 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/07\/11\/patchday-updates-fr-windows-7-8-1-server-juli-2018\/\">Patchday: Updates f\u00fcr Windows 7\/8.1\/Server Juli 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/07\/12\/patchday-microsoft-office-updates-10-juli-2018\/\">Patchday Microsoft Office Updates (10. Juli 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/07\/13\/microsoft-patchday-weitere-updates-zum-10-juli-2018\/\">Microsoft Patchday: Weitere Updates zum 10. Juli 2018<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Am 10. Juli 2018 hat Microsoft diverse (Sicherheits-)Updates (KB4338818,\u00a0 KB4338823) f\u00fcr Windows 7 SP1 und weitere Updates (KB4338815, KB4338824) f\u00fcr Windows 8.1 sowie die korrespondierenden Server-Versionen freigegeben. Hier der \u00dcberblick \u00fcber diese Updates.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185],"tags":[4843,4981,7106,7104,7105,7107,4315,4294,4366],"class_list":["post-206423","post","type-post","status-publish","format-standard","hentry","category-update","tag-kb2952664","tag-kb3150513","tag-kb4338815","tag-kb4338818","tag-kb4338823","tag-kb4338824","tag-update","tag-windows-7","tag-windows-8-1"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/206423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=206423"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/206423\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=206423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=206423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=206423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}