{"id":207928,"date":"2018-08-15T02:48:05","date_gmt":"2018-08-15T00:48:05","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=207928"},"modified":"2024-10-04T20:50:15","modified_gmt":"2024-10-04T18:50:15","slug":"patchday-windows-10-updates-14-august-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/08\/15\/patchday-windows-10-updates-14-august-2018\/","title":{"rendered":"Patchday Windows 10-Updates (14. August 2018)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/win102.jpg\" width=\"58\" height=\"58\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2018\/08\/15\/patchday-windows-10-updates-august-14-2018\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Zum 14. August 2018 (zweiter Dienstag im Monat, Patchday bei Microsoft) wurden verschiedene kumulative Updates f\u00fcr die unterst\u00fctzten Windows 10 Builds freigegeben. Hier einige Details zu den jeweiligen Updates.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/b7e74ade29c74a9a93fe829c402962e1\" alt=\"\" width=\"1\" height=\"1\" \/>Eine Liste der Updates l\u00e4sst sich auf dieser <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4043454\" target=\"_blank\" rel=\"noopener\">Microsoft-Webseite<\/a> abrufen. Zum August 2018 hat Microsoft das Anzeigeformat \u00fcberarbeitet, so dass sich die Informationen leichter abrufen lassen. Ich habe nachfolgend die Details herausgezogen.<\/p>\n<blockquote><p>In allen Updates werden Spectre-Schwachstellen geschlossen \u2013 Details sind in den einzelnen Abschnitten zu finden.<\/p><\/blockquote>\n<h2>Updates f\u00fcr Windows 10 Version 1803<\/h2>\n<p>F\u00fcr Windows 10 April Update (Version 1803) stehen folgende Updates zur Verf\u00fcgung.<\/p>\n<h3>Update KB4343909 f\u00fcr Windows 10 Version 1803<\/h3>\n<p>Das kumulative Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343909\" target=\"_blank\" rel=\"noopener\">KB4343909<\/a> beinhaltet Qualit\u00e4tsverbesserungen aber keine neuen Betriebssystemfunktionen und hebt die OS-Build auf 17134.228. Im Update sich auch Update f\u00fcr Microsoft HoloLens (OS Build 17134.228) enthalten. Hier die Liste der Fixes:<\/p>\n<ul>\n<li>Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3620<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3646<\/a>). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&amp;sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Client<\/a> and <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&amp;sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Server<\/a> guidance KB articles. (<em>These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)<\/em><\/li>\n<li>Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 (CVE-2017-5715 \u2013 Branch Target Injection).<\/li>\n<li>Addresses an issue that prevents apps from receiving mesh updates after resuming. This issue occurs for apps that use Spatial Mapping mesh data and participate in the Sleep or Resume cycle.<\/li>\n<li>Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.<\/li>\n<li>Addresses an issue that prevents some applications running on HoloLens, such as Remote Assistance, from authenticating after upgrading from Windows 10, version 1607, to Windows 10, version 1803.<\/li>\n<li>Addresses an issue that significantly reduced battery life after upgrading to Windows 10, version 1803.<\/li>\n<li>Addresses an issue that causes Device Guard to block some <em>ieframe.dll<\/em> class IDs after installing the May 2018 Cumulative Update.<\/li>\n<li>Addresses a vulnerability related to the <em>Export-Modulemember()<\/em> function when used with a wildcard (*) <u>and<\/u> a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is \"This module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement.\" For more information, see <a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8200&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=kSZ7s7nk9hHky\/03rwqdcaoAMJdwJwd%2BsltaI4ODW\/s%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">CVE-2018-8200<\/a> and <a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/aka.ms\/PSModuleFunctionExport&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=muUIr\/qbRp8\/%2B5fPfLzgY8OcpAEVxR3s9gS5bI6aFAg%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">PSModuleFunctionExport<\/a>.<\/li>\n<li>Addresses an issue that was introduced in the July 2018 .NET Framework update. Applications that rely on COM components were failing to load or run correctly because of \"access denied,\" \"class not registered,\" or \"internal failure occurred for unknown reasons\" errors.<\/li>\n<li>Security updates to Windows Server.<\/li>\n<\/ul>\n<p>Das Update wird per Windows Update verteilt, sollte aber auch per WSUS oder \u00fcber den <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4343909\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> erh\u00e4ltlich sein. Probleme mit dem Update sind Microsoft (aktuell) <del>keine<\/del> bekannt. <strong>Erg\u00e4nzung:<\/strong>\u00a0Microsoft hat bei\u00a0<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343909\/windows-10-update-kb4343909\" target=\"_blank\" rel=\"noopener\">KBb4343909<\/a> folgende Fehlerbeschreibung nachgetragen.<\/p>\n<blockquote><p>Launching Microsoft Edge using the\u00a0<strong class=\"\">New Application Guard<\/strong>\u00a0<strong>Window<\/strong>may fail; normal Microsoft Edge instances are not affected.<\/p><\/blockquote>\n<p>Das Fenster des Application Guard l\u00e4sst sich nicht \u00f6ffnen (wurde mir von Betroffenen auch schon mitgeteilt, siehe<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/17\/windows-10-v1803-probleme-welche-probleme-oh-doch\/\" target=\"_blank\" rel=\"noopener\"> diesen Artikel<\/a>). Der von Microsoft angegebene Workaround lautet, das Update\u00a0KB4343909 zu deinstallieren. Anschlie\u00dfend sind die Updates\u00a0<a class=\"managed-link content-anchor-link\" tabindex=\"0\" href=\"https:\/\/support.microsoft.com\/en-us\/help\/4340917\" target=\"_blank\" rel=\"noopener\" data-content-id=\"4340917\" data-content-type=\"article\" data-bi-name=\"content-anchor-link\" aria-live=\"assertive\">KB4340917<\/a>\u00a0und KB4343909 zu installieren.<\/p>\n<h2>Updates f\u00fcr Windows 10 Version 1709<\/h2>\n<p>F\u00fcr Windows 10 Fall Creators Update (Version 1709) stehen folgende Updates zur Verf\u00fcgung.<\/p>\n<h3>Update KB4343897 f\u00fcr Windows 10 Version 1709<\/h3>\n<p>Das (dynamische) kumulative Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343897\" target=\"_blank\" rel=\"noopener\">KB4343897<\/a> f\u00fcr Windows 10 Version 1709 (Fall Creators Update) hebt die OS Build auf 16299.611 und enth\u00e4lt Qualit\u00e4tsverbesserungen sowie folgende Problembehebungen:<\/p>\n<ul>\n<li>Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3620<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3646<\/a>). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&amp;sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Client<\/a> and <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&amp;sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Server<\/a> guidance KB articles. (<em>These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)<\/em><\/li>\n<li>Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 (CVE-2017-5715 \u2013 Branch Target Injection).<\/li>\n<li>Updates support for the draft version of the Token Binding protocol v0.16.<\/li>\n<li>Addresses an issue that causes Device Guard to block some <em>ieframe.dll<\/em> class IDs after the May 2018 Cumulative Update is installed.<\/li>\n<li>Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.<\/li>\n<li>Addresses an issue that displays \"AzureAD\" as the default domain on the sign-in screen after installing the July 24, 2018 update on a Hybrid Azure AD-joined machine. As a result, users may fail to sign in in Hybrid Azure AD-joined scenarios when users provide only their username and password.<\/li>\n<li>Addresses an issue that adds additional spaces to content that's copied from Internet Explorer to other apps.<\/li>\n<li>Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) <u>and<\/u> a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is \"This module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement\". For more information, see <a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8200&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=kSZ7s7nk9hHky\/03rwqdcaoAMJdwJwd%2BsltaI4ODW\/s%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">CVE-2018-8200<\/a> and <a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/aka.ms\/PSModuleFunctionExport&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=muUIr\/qbRp8\/%2B5fPfLzgY8OcpAEVxR3s9gS5bI6aFAg%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">PSModuleFunctionExport<\/a>.<\/li>\n<li>Addresses an issue that was introduced in the July 2018 .NET Framework update. Applications that rely on COM components were failing to load or run correctly because of \"access denied,\" \"class not registered,\" or \"internal failure occurred for unknown reasons\" errors.<\/li>\n<li>Security updates to Windows Server.<\/li>\n<\/ul>\n<p>Das Update wird per Windows Update verteilt, l\u00e4sst sich aber auch per <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4343897\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> herunterladen.<\/p>\n<p>Bei diesem kumulativen Update gibt es die gleichen bekannten Probleme wie beim Patch vom Vormonat. Einige nicht-englische Plattformen k\u00f6nnen die folgende Zeichenfolge in Englisch anstelle der lokalisierten Sprache anzeigen: \"Reading scheduled jobs from file is not supported in this language mode.\" Dieser Fehler wird angezeigt, wenn der Device Guard aktiviert ist und Sie versuchen, die von Ihnen erstellten geplanten Auftr\u00e4ge zu lesen. Zudem gibt es weitere bekannte Bugs bei aktiviertem Device Guard (z.B. kein &amp; oder . Operator etc., <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343897\" target=\"_blank\" rel=\"noopener\">siehe<\/a>) Microsoft arbeitet an der Behebung der Probleme.<\/p>\n<h3>Dynamic Update\u00a0<span class=\"\">KB4340689 for\u00a0Windows 10 Version 1709<\/span><\/h3>\n<p>Das dynamische Update\u00a0<span class=\"\"><a href=\"http:\/\/support.microsoft.com\/help\/4340689\" target=\"_blank\" rel=\"noopener\">KB4340689<\/a> f\u00fcr\u00a0Windows 10 Version 1709 wird bei der Installation oder beim Zur\u00fccksetzen ben\u00f6tigt und enth\u00e4lt kritische Treiber sowie Verbesserungen beim Setup.<\/span><\/p>\n<h2>Updates f\u00fcr Windows 10 Version 1703<\/h2>\n<p>F\u00fcr Windows 10 Creators Update (Version 1703) stehen folgende Updates zur Verf\u00fcgung.<\/p>\n<h3>Update KB4343885 f\u00fcr Windows 10 Version 1703<\/h3>\n<p>Das kumulative Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343885\" target=\"_blank\" rel=\"noopener\">KB4343885<\/a> f\u00fcr Windows 10 Version 1703 (Creators Update) hebt die OS Build auf 15063.1266 und enth\u00e4lt Qualit\u00e4tsverbesserungen. Das Update steht auch f\u00fcr Windows 10 Mobile (OS Build 15063.1266) zur Verf\u00fcgung. Es adressiert folgende Sicherheitsl\u00fccken und Probleme:<\/p>\n<ul>\n<li>Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3620<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">CVE-2018-3646<\/a>). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&amp;sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Client<\/a> and <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&amp;sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">Windows Server<\/a> guidance KB articles. (<em>These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)<\/em><\/li>\n<li>Addresses an issue that causes Internet Explorer to stop working for certain websites.<\/li>\n<li>Updates support for the draft version of the Token Binding protocol v0.16.<\/li>\n<li>Addresses an issue that causes Device Guard to block some <em>ieframe.dll<\/em> class IDs after installing the May 2018 Cumulative Update.<\/li>\n<li>Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.<\/li>\n<li>Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) <u>and<\/u> a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is \"This module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement\". For more information, see <a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8200&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=kSZ7s7nk9hHky\/03rwqdcaoAMJdwJwd%2BsltaI4ODW\/s%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">CVE-2018-8200<\/a> and <a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/aka.ms\/PSModuleFunctionExport&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=muUIr\/qbRp8\/%2B5fPfLzgY8OcpAEVxR3s9gS5bI6aFAg%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener\">PSModuleFunctionExport<\/a>.<\/li>\n<li>Addresses an issue that was introduced in the July 2018 .NET Framework update. Applications that rely on COM components were failing to load or run correctly because of \"access denied,\" \"class not registered,\" or \"internal failure occurred for unknown reasons\" errors.<\/li>\n<li>Security updates to Windows Server.<\/li>\n<\/ul>\n<p>Das Update wird per Windows Update verteilt, ist aber auch im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4343885\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> erh\u00e4ltlich. Probleme sind keine bekannt.<\/p>\n<blockquote><p>Windows Update Verbesserungen<\/p><\/blockquote>\n<blockquote><p>Microsoft hat ein Update direkt f\u00fcr den Windows Update Client ver\u00f6ffentlicht, um dessen Zuverl\u00e4ssigkeit zu erh\u00f6hen. Jedes Ger\u00e4t mit Windows 10, das f\u00fcr automatisch Updates per Windows Update konfiguriert ist, erh\u00e4lt das Funktionsupdate (auf V1803). Auch Windows 10 Enterprise und die Pro Edition erhalten das Funktionsupdate (auf V1803), basierend auf der Ger\u00e4tekompatibilit\u00e4t und der unter Windows Update for Business Stundungsrichtlinie eingestellten Update-Verz\u00f6gerung (Defer). Dies gilt nicht f\u00fcr LTSC-Versionen.<\/p><\/blockquote>\n<h3>Dynamic Update KB4343885 f\u00fcr Windows 10 Version 1703<\/h3>\n<p>Update <a href=\"http:\/\/support.microsoft.com\/help\/4343885\" target=\"_blank\" rel=\"noopener\">KB4343885<\/a> f\u00fcr Windows 10 Version 1703 wird bei der Installation oder beim Zur\u00fccksetzen vom Update-Server abgerufen.\u00a0In dem Microsoft-Softwareprodukt wurde ein Sicherheitsproblem identifiziert, das sich auf Ihr System auswirken k\u00f6nnte.<\/p>\n<h2>Updates f\u00fcr Windows 10 Version 1507 bis 1607<\/h2>\n<p>F\u00fcr Windows 10 RTM bis Windows 10 Anniversary Update (Version 1607) stehen verschiedene Updates zur Verf\u00fcgung. Hier eine Kurz\u00fcbersicht.<\/p>\n<ul>\n<li><strong>Windows 10 Version 1607:<\/strong> Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343887\" target=\"_blank\" rel=\"noopener\">KB4343887<\/a> steht nur noch f\u00fcr Enterprise und Education sowie Windows Server 2016 bereit. Das Update hebt die OS-Build auf 14393.2430. Es sind u.a. auch die oben f\u00fcr andere Updates erw\u00e4hnten Spectre-Fixes enthalten. Dieses Update wird automatisch von Windows Update heruntergeladen und installiert, steht aber im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4343887\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> als Download zur Verf\u00fcgung. Vor der manuellen Installation muss das Servicing Stack Update (SSU) (<a href=\"https:\/\/support.microsoft.com\/help\/4132216\/\" target=\"_blank\" rel=\"noopener\">KB4132216<\/a>) installiert werden. Details sind im KB-Artikel zu finden.<\/li>\n<li><strong>Windows 10 Version 1507:<\/strong> Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343892\" target=\"_blank\" rel=\"noopener\">KB4343892<\/a> steht f\u00fcr die RTM-Version (LTSC) bereit. Das Update hebt die OS-Build auf 10240.17946. Es sind u.a. auch die oben f\u00fcr andere Updates erw\u00e4hnten Spectre-Fixes enthalten. Dieses Update wird automatisch von Windows Update heruntergeladen und installiert, steht aber im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4343892\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> als Download zur Verf\u00fcgung. \u00c4hnlich wie bei Windows 10 Version 1703 gibt es auch Verbesserungen an Windows Update (siehe Anmerkung, weiter oben). Details sind im KB-Artikel zu finden<\/li>\n<\/ul>\n<p>F\u00fcr Windows 10 V1511 gab es kein Update, das diese Version auf dem Support gefallen ist. Details zu obigen Updates sind im Zweifelsfall den jeweiligen Microsoft KB-Artikeln zu entnehmen.<\/p>\n<p><strong>\u00c4hnliche Artikel:<br \/>\n<\/strong><a href=\"https:\/\/web.archive.org\/web\/20240222171800\/https:\/\/borncity.com\/blog\/2018\/08\/14\/sicherheitsupdate-fr-adobe-acrobat-reader\/\">Sicherheitsupdate f\u00fcr Adobe Acrobat\/Reader<\/a><br \/>\nAdobe Flash Player: Update Version 30.0.0.154<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/08\/microsoft-office-patchday-7-august-2018\/\">Microsoft Office Patchday (7. August 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/10\/windows10-updates-kb4295110-kb4023057-9-8-2018\/\">Windows 10 Updates KB4295110\/KB4023057 (9.8.2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/14\/microsoft-security-update-summary-14-august-2018\/\">Microsoft Security Update Summary 14. August 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/15\/patchday-updates-fr-windows-7-8-1-server-14-august-2018\/\">Patchday: Updates f\u00fcr Windows 7\/8.1\/Server 14. August 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/15\/patchday-windows-10-updates-14-august-2018\/\">Patchday Windows 10-Updates (14. August 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/15\/patchday-microsoft-office-updates-14-august-2018\/\" rel=\"bookmark\">Patchday Microsoft Office Updates (14. August 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/15\/microsoft-patchday-weitere-updates-zum-14-august-2018\/\" rel=\"bookmark\">Microsoft Patchday: Weitere Updates zum 14. August 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/31\/windows-10-update-kb4346783-kb4343893-kb4343889-kb4343884\/\" rel=\"bookmark\">Windows 10: Update KB4346783, KB4343893, KB4343889, KB4343884 (30.8.2018)<\/a><\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20240303035929\/https:\/\/borncity.com\/blog\/2018\/08\/15\/foreshadow-co-neue-spectre-hnliche-cpu-schwachstellen\/\" rel=\"bookmark\">Foreshadow (L1TF), neue (Spectre-\u00e4hnliche) CPU-Schwachstellen<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/17\/windows-10-v1803-probleme-welche-probleme-oh-doch\/\">Windows 10 V1803: Probleme, welche Probleme? Oh, doch!<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Zum 14. August 2018 (zweiter Dienstag im Monat, Patchday bei Microsoft) wurden verschiedene kumulative Updates f\u00fcr die unterst\u00fctzten Windows 10 Builds freigegeben. Hier einige Details zu den jeweiligen Updates.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,185,3694],"tags":[7170,7169,4328,4315,4378],"class_list":["post-207928","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-update","category-windows-10","tag-kb4343897-kb4343885","tag-kb4343909","tag-sicherheit","tag-update","tag-windows-10"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/207928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=207928"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/207928\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=207928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=207928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=207928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}