{"id":9790,"date":"2019-05-20T00:20:00","date_gmt":"2019-05-19T22:20:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=9790"},"modified":"2024-10-05T18:25:05","modified_gmt":"2024-10-05T16:25:05","slug":"windows-10-v1809-issues-with-update-kb4494441","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/05\/20\/windows-10-v1809-issues-with-update-kb4494441\/","title":{"rendered":"Windows 10 V1809: Issues with Update KB4494441"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/win102.jpg\" width=\"58\" align=\"left\" height=\"58\">[<a href=\"https:\/\/www.borncity.com\/blog\/2019\/05\/16\/windows-10-v1809-probleme-mit-update-kb4494441\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]At the moment there is some confusion about the cumulative update KB4494441 for Windows 10 Version 1809. And there are other issues, that have been reported.<\/p>\n<p><!--more--><\/p>\n<h2>Update KB4494441 for Windows 10 V1809<\/h2>\n<p>Ccumulative update KB4494441 for Windows 10 Version 1809 was released on May 14, 2019 as a security update during the regular patchday. I reported about it in the blog post Patchday Windows 10 Updates (May 14, 2019). Microsoft mentioned two fixes. Retpoline protection will be enabled in this update as soon as Spectre V2 is enabled:&nbsp; <\/p>\n<ul>\n<li>Enables \"Retpoline\" by default if Spectre Variant 2 (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/adv180002\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2017-5715<\/a>) is enabled. Make sure previous OS protections against the Spectre Variant 2 vulnerability are enabled using the registry settings described in the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Client<\/a> and <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\/windows-server-speculative-execution-side-channel-vulnerabilities-prot\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Server<\/a>articles. (These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions). For more information about \"Retpoline\", see <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Kernel-Internals\/Mitigating-Spectre-variant-2-with-Retpoline-on-Windows\/ba-p\/295618\" target=\"_blank\" rel=\"noopener noreferrer\">Mitigating Spectre variant 2 with Retpoline on Windows<\/a>.\n<li>Provides protections against a new subclass of speculative execution side-channel vulnerabilities, known as <em>Microarchitectural Data Sampling<\/em>, for 64-Bit (x64) versions of Windows (<a href=\"https:\/\/web.archive.org\/web\/20200916142137\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190013\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-11091<\/a>, <a href=\"https:\/\/web.archive.org\/web\/20200916142137\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190013\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-12126<\/a>, <a href=\"https:\/\/web.archive.org\/web\/20200916142137\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190013\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-12127<\/a>, <a href=\"https:\/\/web.archive.org\/web\/20200916142137\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190013\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-12130<\/a>). Use the registry settings as described in the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Client<\/a> and <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\/windows-server-speculative-execution-side-channel-vulnerabilities-prot\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Server<\/a> articles<em>. <\/em>(These registry settings are enabled by default for Windows Client OS editions and Windows Server OS editions).<\/li>\n<\/ul>\n<p>The update is also intended to introduce protection against the microarchitectural data sampling vulnerability called Zombieload. <\/p>\n<h2>Issues reported <\/h2>\n<p>There are some user comments reporting issues with update KB4494441 (see my German blog post <a href=\"https:\/\/www.borncity.com\/blog\/2019\/05\/15\/patchday-windows-10-updates-14-mai-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">Patchday Windows 10-Updates (14. Mai 2019)<\/a>).<\/p>\n<ul>\n<li>Update agent broken: Blog reader Tobias reported in <a href=\"https:\/\/www.borncity.com\/blog\/2019\/05\/15\/patchday-windows-10-updates-14-mai-2019\/#comment-71985\">this comment<\/a> that the Windows Update Agent is broken after installing. Windows Update Agents reports error code 0x8024002E (agent *FAILED* [8024002E] CheckAccessByPolicy) during the next update search. This is also reported in <a href=\"https:\/\/www.borncity.com\/blog\/2019\/05\/15\/patchday-windows-10-updates-14-mai-2019\/#comment-72056\" target=\"_blank\" rel=\"noopener noreferrer\">this comment<\/a> and should also occur with Windows 10 V1803).\n<li>Temporary user profile: <a href=\"https:\/\/www.borncity.com\/blog\/2019\/05\/15\/patchday-windows-10-updates-14-mai-2019\/#comment-71989\">This comment<\/a> reports a temporary user profile is used after installing the update &#8211; but could be an isolated case.&nbsp;&nbsp;\n<li>Hyper-V Hypervisor broken: In <a href=\"https:\/\/www.borncity.com\/blog\/2019\/05\/15\/patchday-windows-10-updates-14-mai-2019\/#comment-72024\" target=\"_blank\" rel=\"noopener noreferrer\">this comment<\/a> it is reported that the Hypervisor for Hyper-V does not start on Windows Server 2019 anymore.&nbsp; <\/li>\n<\/ul>\n<p>In addition, there seems to be a bug that now also occurs under Windows 10 V1809 with this update installed. <\/p>\n<ul>\n<li>Multiple reboots, multiple installations required: <a href=\"https:\/\/www.borncity.com\/blog\/2019\/05\/15\/patchday-windows-10-updates-14-mai-2019\/#comment-72044\" target=\"_blank\" rel=\"noopener noreferrer\">This comment reports<\/a> that the update was installed multiple times on multiple systems. There is also <a href=\"https:\/\/old.reddit.com\/r\/Windows10\/comments\/bolodf\/cumulative_updates_may_14th_2019\/enie2kv\/\" target=\"_blank\" rel=\"noopener noreferrer\">a thread on reddit.com<\/a>. This is well known (Microsoft has confirmed this <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-information\/status-windows-10-1809-and-windows-server-2019#376msgdesc\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>) and has been reported elsewhere. In the following section a user reports about several reboots. <a href=\"https:\/\/www.borncity.com\/blog\/2019\/05\/15\/patchday-windows-10-updates-14-mai-2019\/#comment-72049\" target=\"_blank\" rel=\"noopener noreferrer\">This comment<\/a> notes that the Explorer no longer works.\n<li>Furthermore, users <a href=\"https:\/\/www.borncity.com\/blog\/2019\/05\/15\/patchday-windows-10-updates-14-mai-2019\/#comment-72060\" target=\"_blank\" rel=\"noopener noreferrer\">noticed<\/a> that the build number does not change after the installation &#8211; I found it elsewhere &#8211; I remember that it worked after a new installation run. <\/li>\n<\/ul>\n<p>The most serious thing I can see in this list: The update agent seems to be corrupted by the SSU or cumulative update and returns error 0x8024002E. The bug has also been reported earlier (see here and <a href=\"https:\/\/web.archive.org\/web\/20200806020324\/https:\/\/social.technet.microsoft.com\/Forums\/de-DE\/67fe010a-8f71-4305-97be-be81d1f7f433\/wsus-clients-not-receiving-updates?forum=winserverwsus\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>). I had written something about it in my German blog post <a href=\"https:\/\/www.borncity.com\/blog\/2015\/11\/17\/windows-10-update-fehler-0x8024002e\/\">Windows 10: Update-Fehler 0x8024002E<\/a>, but I'm not sure if it will help.&nbsp; <\/p>\n<h2>Multiple reboots and more issues<\/h2>\n<p>When I created the blog post, I had already linked <a href=\"https:\/\/twitter.com\/cybericua\/status\/1128817166663348224\" target=\"_blank\" rel=\"noopener noreferrer\">a tweet<\/a> in which users @PhantomofMobile reported about issues.&nbsp; <\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p lang=\"en\" dir=\"ltr\">Another thing it took two restarts to Install the CU making that three restarts to install the SSU + .NET &amp; CU.<a href=\"https:\/\/twitter.com\/AskWoody?ref_src=twsrc%5Etfw\">@AskWoody<\/a> <a href=\"https:\/\/twitter.com\/SBSDiva?ref_src=twsrc%5Etfw\">@SBSDiva<\/a> <a href=\"https:\/\/twitter.com\/etguenni?ref_src=twsrc%5Etfw\">@etguenni<\/a> <a href=\"https:\/\/twitter.com\/AdminKirsty?ref_src=twsrc%5Etfw\">@AdminKirsty<\/a> <a href=\"https:\/\/twitter.com\/JobCacka?ref_src=twsrc%5Etfw\">@JobCacka<\/a> <a href=\"https:\/\/t.co\/koshRrBH4L\">pic.twitter.com\/koshRrBH4L<\/a><\/p>\n<p>\u2014 Crysta T. Lacey (@PhantomofMobile) <a href=\"https:\/\/twitter.com\/PhantomofMobile\/status\/1128585156049031169?ref_src=twsrc%5Etfw\">15. Mai 2019<\/a><\/p><\/blockquote>\n<p><span id=\"preserve0e3b0c263b3e4854b3cf5e367d52f0f2\" class=\"wlWriterPreserve\"><SCRIPT charset=\"utf-8\" src=\"https:\/\/platform.twitter.com\/widgets.js\" async><\/SCRIPT><\/span> <\/p>\n<p>Once he had to do two reboots to get the update installed. He also noticed that the build numbers for the cumulative update and the servicing stack update were the same as KB4499728 (17763.503.1.x). <\/p>\n<p><span id=\"preserve244078a5b719485b88c386324a24e6e0\" class=\"wlWriterPreserve\"><SCRIPT charset=\"utf-8\" src=\"https:\/\/platform.twitter.com\/widgets.js\" async><\/SCRIPT><\/span> <\/p>\n<p>But even more strange is @PhantomofMobile's hint that it has not yet received any hint that protection against the Microarchitectural Data Sampling vulnerability called Zombieload has been enabled. He posted a PowerShell output showing the status of each protection. There, MDS is set to False. . <\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p lang=\"en\" dir=\"ltr\">Thanks for the heads-up. The team is looking at this, no action is required to enable the mitigation, you likely don't have the latest microcode so the mitigation is disabled. Please confirm? If I recall your setup correctly you need to get from oem. Documentation can be improved<\/p>\n<p>\u2014 Jorge Lopez (@cybericua) <a href=\"https:\/\/twitter.com\/cybericua\/status\/1128676908168728576?ref_src=twsrc%5Etfw\">15. Mai 2019<\/a><\/p><\/blockquote>\n<p><span id=\"preserve8a87bcdb4bbc41c6879d1ddc32476a94\" class=\"wlWriterPreserve\"><SCRIPT charset=\"utf-8\" src=\"https:\/\/platform.twitter.com\/widgets.js\" async><\/SCRIPT><\/span> <\/p>\n<p>Microsoft's Jorge Lopez then contacted us and wrote that you don't really have to do anything as a user. According to <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Kernel-Internals\/Mitigating-Spectre-variant-2-with-Retpoline-on-Windows\/ba-p\/295618\" target=\"_blank\" rel=\"noopener noreferrer\">this addendum in the Technet community<\/a>, Retpoline should be activated automatically under Windows 10 Version 1809 and Windows Server 2019 or newer versions if the prerequisites are met. His team is taking a look at this. It may be related to the microcode updates that OEMs have to deliver for their motherboards. Intel may not have taken something into account in its BIOS updates for the NUCs the user is using. The <a href=\"https:\/\/twitter.com\/cybericua\/status\/1128817166663348224\" target=\"_blank\" rel=\"noopener noreferrer\">discussion on Twitter<\/a> is still ongoing. <\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2019\/05\/17\/windows-10-v1809-retpoline-is-automatically-active-now\/\">Windows 10 V1809: Retpoline is automatically active now<\/a><br \/>Windows 10 (V1903): Update KB4497936; global rollout<br \/>Patchday Windows 10 Updates (May 14, 2019)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]At the moment there is some confusion about the cumulative update KB4494441 for Windows 10 Version 1809. And there are other issues, that have been reported.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463,22,2],"tags":[1933,195,1604],"class_list":["post-9790","post","type-post","status-publish","format-standard","hentry","category-issue","category-update","category-windows","tag-kb4494441","tag-update","tag-windows-10-v1809"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/9790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=9790"}],"version-history":[{"count":2,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/9790\/revisions"}],"predecessor-version":[{"id":35476,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/9790\/revisions\/35476"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=9790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=9790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=9790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}