{"id":5390,"date":"2018-04-05T10:15:20","date_gmt":"2018-04-05T08:15:20","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=5390"},"modified":"2024-10-05T21:18:28","modified_gmt":"2024-10-05T19:18:28","slug":"windows-kb4090450-kb4088875-kb4088878-kb4088881","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/04\/05\/windows-kb4090450-kb4088875-kb4088878-kb4088881\/","title":{"rendered":"Windows Update revisions KB4090450, KB4088875, KB4088878, KB4088881"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" title=\"Update\" style=\"border-left-width: 0px; border-right-width: 0px; border-bottom-width: 0px; float: left; margin: 0px 10px 0px 0px; display: inline; border-top-width: 0px\" border=\"0\" alt=\"Windows Update\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" width=\"54\" align=\"left\" height=\"54\">[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/04\/05\/windows-kb4090450-kb4088875-kb4088878-kb4088881\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]On April 4, 2018 Microsoft has revised the updates KB4090450, KB4088875, KB4088878, KB408888881 for Windows. I collected some details, and there are other details about Windows bugs. <\/p>\n<p><!--more--><\/p>\n<p>German <img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/8d88b34d11484e0197f693f49ce748f7\" width=\"1\" height=\"1\">blog reader Sebastian noticed that the updates are offered again at WSUS, so he left a <a href=\"https:\/\/www.borncity.com\/blog\/2018\/03\/14\/netzwerkprobleme-mit-updates-kb4088875-kb4088878\/#comment-56213\" target=\"_blank\" rel=\"noopener noreferrer\">comment<\/a>. <\/p>\n<blockquote>\n<p>WSUS today announced that KB4088875, KB4088878 and KB408888881 have been revised. <\/p>\n<p>But nothing has changed in the KB article? Bugs still present. <\/p>\n<p>Who has the latest information?<\/p>\n<\/blockquote>\n<p>I then checked the Microsoft Update Catalog and found the Windows Update KB4090450 with release date April 4, 2018.&nbsp; <\/p>\n<p><img decoding=\"async\" title=\"Update KB4090450\" alt=\"Update KB4090450\" src=\"https:\/\/i.imgur.com\/EJdtper.jpg\">  <\/p>\n<p>The updates are described in the following KB articles at Microsoft, and the revision date has been adjusted. I once compared my old descriptions with the current KB articles on the updates as well as old versions by wayback machine. The following seems to have changed &#8211; hope I haven't overlooked anything. <\/p>\n<h2>Update KB4090450 for Windows Server 2008<\/h2>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4090450\/security-update-for-vulnerabilities-in-windows-server-2008\" target=\"_blank\" rel=\"noopener noreferrer\">KB4090450<\/a> (Description of the security update for the speculative execution side-channel vulnerabilities in Windows Server 2008: March 13, 2018) article has been revised on April 3, 2018. <\/p>\n<p>I haven't found any details of what has been revised here. However, since this is a Spectre V2 patch, it could be that the microcode has been updated for additional CPUs.&nbsp;&nbsp;&nbsp; <\/p>\n<h2>Update KB4088875 for Windows 7\/Server 2008 R2<\/h2>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4088875\/windows-7-update-kb4088875\" target=\"_blank\" rel=\"noopener noreferrer\">KB4088875<\/a> is the March 13, 2018 (Monthly Rollup) for Windows 7 SP1 and Windows Server 2008 R2 SP1. The kb article has been revised on April 5, 2018. They added the following text:<\/p>\n<blockquote>\n<p><strong>Important <\/strong>Please apply <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4100480\" target=\"_blank\" rel=\"noopener noreferrer\">KB4100480<\/a> immediately after applying this update. KB4100480 resolves an elevation of privilege vulnerability in the Windows Kernel for the 64-Bit (x64) version of Windows. This vulnerability is documented in <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-1038\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-1038<\/a>.<\/p>\n<\/blockquote>\n<p>And there is an extension within the known issues section:<\/p>\n<blockquote>\n<p>After you install this update, you may receive a Stop error message that resembles the following when you log off the computer:  <\/p>\n<p>SESSION_HAS_VALID_POOL_ON_EXIT (ab)<\/p>\n<\/blockquote>\n<p>To solve this issue, install update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4099467\" target=\"_blank\" rel=\"noopener noreferrer\">KB4099467<\/a>.<\/p>\n<h2>Update KB4088878 for Windows 7\/Server 2008 R2<\/h2>\n<p>Update KB4088878 is the March 13, 2018 (Security-only update) for Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1. It contains also: <\/p>\n<blockquote>\n<p>Spectre and Meltdown protections for 32-Bit (x86) and 64-Bit (x64) versions of Windows, except the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4078130\" target=\"_blank\" rel=\"noopener noreferrer\">KB4078130<\/a> update that was offered to disable mitigation against Spectre Variant 2.<\/p>\n<\/blockquote>\n<p>and the kb article has been revised on April 5, 2018. Microsoft added the section dealing with the SESSION_HAS_VALID_POOL_ON_EXIT bug (see previous section above). Maybe some micro codes has been updated. <\/p>\n<h2>Update KB4088881 fo\u00fcr Windows 7\/Server 2008 R2<\/h2>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4088881\/windows-7-update-kb4088881\" target=\"_blank\" rel=\"noopener noreferrer\">KB4088881<\/a> is the March 23, 2018 (Preview of Monthly Rollup) for Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1. The kb article has been revised on April 5, 2018 \u2013 Microsoft added.<\/p>\n<blockquote>\n<p><strong>Important <\/strong>Please apply <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4100480\" target=\"_blank\" rel=\"noopener noreferrer\">KB4100480<\/a> immediately after applying this update. KB4100480 resolves an elevation of privilege vulnerability in the Windows Kernel for the 64-Bit (x64) version of Windows. This vulnerability is documented in <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-1038\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-1038<\/a>.<\/p>\n<\/blockquote>\n<h2>Addendum to Update KB4088883<\/h2>\n<p>Another small addendum to update KB408888883 for Windows 8.1\/Windows Server 2012\/R2 (from 03\/21\/2018). The preview rollup update is described in the blog post <a href=\"https:\/\/borncity.com\/win\/2018\/03\/22\/updates-for-windows-8-1-windows-server-2012-r2-03-21-2018\/\">Updates for Windows 8.1\/Windows Server 2012\/R2 (03\/21\/2018)<\/a>. Askwoody reports <a href=\"https:\/\/www.askwoody.com\/2018\/reported-major-problem-with-kb-4088883-the-preview-of-the-april-monthly-rollup-for-server-2012\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> that the update can trigger the BlueScreen 0x00000000C4.<\/p>\n<blockquote>\n<p>askwoody.com also has <a href=\"https:\/\/www.askwoody.com\/2018\/new-versions-of-buggy-march-win7-patches-are-out\/\" target=\"_blank\" rel=\"noopener noreferrer\">this<\/a> article mentions also some update revisions. <\/p>\n<\/blockquote>\n<h2>The Very Last \u2026<\/h2>\n<p>Just stumbled uppon this tweet from Alex Ionescu, that mentions a bug on all Windows versions causing a blue screen (BSOD). <\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p lang=\"en\" dir=\"ltr\">Six months ago I submitted an unprivileged local DoS (BSOD) in all versions of Windows. It was closed as \"Won't fix\" and marked that it would be looked into for vNext. I kept the tweetable PoC to myself. The next release is RTM and still has the bug. The fix is a one line change.<\/p>\n<p>\u2014 Alex Ionescu (@aionescu) 4. April 2018<\/p><\/blockquote>\n<p><span id=\"preservebb542a04306e426396e51216beaae838\" class=\"wlWriterPreserve\"><SCRIPT charset=\"utf-8\" src=\"https:\/\/platform.twitter.com\/widgets.js\" async><\/SCRIPT><\/span> <\/p>\n<p>Dedicated to all happy Windows 10 users upgrading to Windows 10 Spring Creators Update, V1803: Glad, the bug is still there. <\/p>\n<blockquote>\n<p>BTW: The name Windows 10 Spring Creators Update is confirmed (see <a href=\"https:\/\/twitter.com\/teroalhonen\/status\/981544967536492544\" target=\"_blank\" rel=\"noopener noreferrer\">this tweet<\/a>).<\/p>\n<\/blockquote>\n<p><strong>Similar articles:<br \/><\/strong>Windows 7: Preview Rollup Update KB4088881 (03\/23\/2018)<br \/><a href=\"https:\/\/borncity.com\/win\/2018\/03\/14\/security-updates-for-windows-7-8-1-march-13-2018\/\">Security Updates for Windows 7\/8.1 (March 13, 2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/03\/14\/patchday-windows-10-updates-march-13-2018\/\">Patchday: Windows 10 Updates (March 13, 2018)<\/a><br \/><a href=\"https:\/\/web.archive.org\/web\/20210512195851\/https:\/\/borncity.com\/win\/2018\/03\/15\/microsoft-office-patchday-march-13-2018\/\">Microsoft Office Patchday (March 13, 2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/03\/18\/network-issues-with-updates-kb4088875-kb4088878\/\">Network issues with Updates KB4088875 \/ KB4088878<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/03\/22\/updates-for-windows-8-1-windows-server-2012-r2-03-21-2018\/\">Updates for Windows 8.1\/Windows Server 2012\/R2 (03\/21\/2018)<\/a><br \/><a href=\"https:\/\/web.archive.org\/web\/20210422225822\/https:\/\/borncity.com\/win\/2018\/03\/23\/windows-10-updates-march-22-2018\/\">Windows 10 Updates March 22, 2018<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/03\/24\/internet-explorer-update-kb4096040-march-23-2018\/\">Internet Explorer Update KB4096040 (March 23, 2018)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]On April 4, 2018 Microsoft has revised the updates KB4090450, KB4088875, KB4088878, KB408888881 for Windows. I collected some details, and there are other details about Windows bugs.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,2],"tags":[1321,1322,1336,1352,1353,195,194],"class_list":["post-5390","post","type-post","status-publish","format-standard","hentry","category-update","category-windows","tag-kb4088875","tag-kb4088878","tag-kb4088881","tag-kb4090450","tag-re-release","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=5390"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5390\/revisions"}],"predecessor-version":[{"id":35827,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5390\/revisions\/35827"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=5390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=5390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=5390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}