{"id":207924,"date":"2018-08-15T02:04:19","date_gmt":"2018-08-15T00:04:19","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=207924"},"modified":"2024-10-04T20:50:15","modified_gmt":"2024-10-04T18:50:15","slug":"patchday-updates-fr-windows-7-8-1-server-14-august-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/08\/15\/patchday-updates-fr-windows-7-8-1-server-14-august-2018\/","title":{"rendered":"Patchday: Updates f&uuml;r Windows 7\/8.1\/Server 14. August 2018"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"54\" height=\"54\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/borncity.com\/win\/2018\/08\/15\/patchday-updates-for-windows-7-8-1-server-august-14-2018\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Am 14. August 2018 hat Microsoft diverse (Sicherheits-)Updates (KB4343900,\u00a0 KB4343899) f\u00fcr Windows 7 SP1 und weitere Updates (KB4343898, KB4343888 ) f\u00fcr Windows 8.1 sowie die korrespondierenden Server-Versionen freigegeben. Hier der \u00dcberblick \u00fcber diese Updates.<\/p>\n<p><!--more--><\/p>\n<h2>Updates f\u00fcr Windows 7\/Windows Server 2008 R2<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/9056b2fb48b5441f9fee16d995c7175e\" alt=\"\" width=\"1\" height=\"1\" \/>F\u00fcr Windows 7 SP1 und Windows Server 2008 R2 SP1 wurden ein Rollup und ein Security-only Update freigegeben. Die Update-Historie f\u00fcr Windows 7 ist auf <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4009469\">dieser Microsoft-Seite<\/a> zu finden.<\/p>\n<h3>KB4343900 (Monthly Rollup) f\u00fcr Windows 7\/Windows Server 2008 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343900\" target=\"_blank\" rel=\"noopener\">KB44343900<\/a> (August 14, 2018, Monthly Quality Rollup for Windows 7 SP1 and Windows Server 2008 R2 SP1) enth\u00e4lt Verbesserungen und Bug-Fixes, die bereits im Update vom Vormonat enthalten waren. Das Update adressiert folgendes:<\/p>\n<ul>\n<li>Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3620<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3646<\/a>). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&amp;sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Client<\/a> and <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&amp;sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Server<\/a> guidance KB articles. (<em>These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)<\/em><\/li>\n<li>Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 (CVE-2017-5715 \u2013 Branch Target Injection).<\/li>\n<li>Provides protections against an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV180016\" target=\"_blank\" rel=\"noopener\">CVE-2018-3665<\/a>) for 32-Bit (x86) versions of Windows.<\/li>\n<\/ul>\n<p>Es handelt sich also ausschlie\u00dflich um Updates, die Spectre-Schwachstellen schlie\u00dfen oder Folgen solcher Updates kurieren sollen. Beachtet die Hinweise zu den Registrierungseinstellungen f\u00fcr <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&amp;sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Client<\/a> and <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&amp;sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Server<\/a> zum An- oder Abschalten.<\/p>\n<p>Das Update wird automatisch von Windows Update heruntergeladen und installiert. Es ist aber auch \u00fcber den <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4343900\">Microsoft Update Catalog<\/a> herunterladbar.<\/p>\n<blockquote><p>Korrektur: Urspr\u00fcnglich stand im KB-Beitrag, dass das Update das seit vielen Monaten bekannt Problem, dass der NIC (network interface controller) wegen einer fehlenden Dritthersteller .inf-Datei nicht mehr funktioniert, hat. Abhilfe schaffte, den NIC \u00fcber den Ger\u00e4te-Manager neu installieren zu lassen. Microsoft hat diesen Hinweis inzwischen aus dem KB-Artikel entfernt.<\/p><\/blockquote>\n<h3>KB4343899 (Security Only) f\u00fcr Windows 7\/Windows Server 2008 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343899\" target=\"_blank\" rel=\"noopener\">KB4343899<\/a> (Security-only update) steht f\u00fcr Windows 7 SP1 und Windows Server 2008 R2 SP1 zur Verf\u00fcgung. Das Update adressiert die gleichen Punkte wie das obige Update KB4343900.<\/p>\n<p>Das Update gibt es per WSUS oder im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4343899\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. Probleme sind keine bekannt. Bei Installation des Security Only Update ist auch KB4343205 f\u00fcr den IE zu installieren.<\/p>\n<h2>Updates f\u00fcr Windows 8.1\/Windows Server 2012 R2<\/h2>\n<p>F\u00fcr Windows 8.1 und Windows Server 2012 R2 wurden ein Rollup und ein Security-only Update freigegeben. Die Update-Historie f\u00fcr Windows 8.1 ist auf <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4009470\/windows-8-1-windows-server-2012-r2-update-history\">dieser Microsoft-Seite<\/a> zu finden.<\/p>\n<h3>KB4343898 (Monthly Rollup) f\u00fcr Windows 8.1\/Server 2012 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343898\" target=\"_blank\" rel=\"noopener\">KB4343898<\/a> (Monthly Rollup for Windows 8.1 and Windows Server 2012 R2) enth\u00e4lt Verbesserungen und Fixes, die im Rollup des Vormonats enthalten waren. Zudem adressiert es die folgenden Punkte.<\/p>\n<ul>\n<li>Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3620<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3646<\/a>). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&amp;sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Client<\/a> and <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&amp;sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Server<\/a> guidance KB articles. (<em>These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS Editions.<\/em>)<\/li>\n<li>Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.<\/li>\n<li>Addresses an issue that may prevent your device from starting up properly if you install <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/3033055\" target=\"_blank\" rel=\"noopener\">KB3033055<\/a> (released September 2015) <u>after <\/u>installing any Monthly Rollup dated November 2017 or later.<\/li>\n<\/ul>\n<p>Dieses Update wird automatisch von Windows Update heruntergeladen und installiert, ist aber auch im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4343898\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> erh\u00e4ltlich. Probleme sind mit dem Update keine bekannt.<\/p>\n<h3>KB4343888 (Security-only update) f\u00fcr Windows 8.1\/Server 2012 R2<\/h3>\n<p>Update KB4343888 (Security Only Quality Update for Windows 8.1 and Windows Server 2012 R2) adressiert folgenden Punkt.<\/p>\n<blockquote><p>Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3620<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3646<\/a>). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&amp;sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Client<\/a> and <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&amp;sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Server<\/a> guidance KB articles. (<em>These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS Editions.<\/em>)<\/p><\/blockquote>\n<p>Das Update gibt es per WSUS oder im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4343888\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. Fehler sind Microsoft momentan keine bekannt. Bei Installation des Security Only Update ist auch KB4343205 f\u00fcr den IE zu installieren.<\/p>\n<p><strong>\u00c4hnliche Artikel:<br \/>\n<\/strong><a href=\"https:\/\/web.archive.org\/web\/20240222171800\/https:\/\/borncity.com\/blog\/2018\/08\/14\/sicherheitsupdate-fr-adobe-acrobat-reader\/\">Sicherheitsupdate f\u00fcr Adobe Acrobat\/Reader<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/08\/microsoft-office-patchday-7-august-2018\/\">Microsoft Office Patchday (7. August 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/10\/windows10-updates-kb4295110-kb4023057-9-8-2018\/\">Windows 10 Updates KB4295110\/KB4023057 (9.8.2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/14\/microsoft-security-update-summary-14-august-2018\/\">Microsoft Security Update Summary 14. August 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/15\/patchday-updates-fr-windows-7-8-1-server-14-august-2018\/\">Patchday: Updates f\u00fcr Windows 7\/8.1\/Server 14. August 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/15\/patchday-microsoft-office-updates-14-august-2018\/\" rel=\"bookmark\">Patchday Microsoft Office Updates (14. August 2018)<\/a><\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20240303035929\/https:\/\/borncity.com\/blog\/2018\/08\/15\/foreshadow-co-neue-spectre-hnliche-cpu-schwachstellen\/\" rel=\"bookmark\">Foreshadow (L1TF), neue (Spectre-\u00e4hnliche) CPU-Schwachstellen<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Am 14. August 2018 hat Microsoft diverse (Sicherheits-)Updates (KB4343900,\u00a0 KB4343899) f\u00fcr Windows 7 SP1 und weitere Updates (KB4343898, KB4343888 ) f\u00fcr Windows 8.1 sowie die korrespondierenden Server-Versionen freigegeben. Hier der \u00dcberblick \u00fcber diese Updates.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185],"tags":[7168,7167,7166,7165,4315,4294,4366,4364],"class_list":["post-207924","post","type-post","status-publish","format-standard","hentry","category-update","tag-kb4343888","tag-kb4343898","tag-kb4343899","tag-kb4343900","tag-update","tag-windows-7","tag-windows-8-1","tag-windows-server"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/207924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=207924"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/207924\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=207924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=207924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=207924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}