Here’s what Patch Tuesday fixed in Windows 7 and 8.1 (changelog)

Here's what Patch Tuesday fixed in Windows 7 and 8.1 (changelog) 1

Microsoft did not just push out updates for Windows 10 and Windows Mobile yesterday, but also for the hundreds of millions of users still on Windows 7 and of course the much smaller number on Windows 8.1

For those users, here’s what’s been fixed and possibly broken by the update:

Those on Windows 7 SP1 and Windows Server 2008 R2 SP1 are getting KB4343900, which contains the following fixes:

  • Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel® Core® processors and Intel® Xeon® processors (CVE-2018-3620 and CVE-2018-3646). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the Windows Client and Windows Server guidance KB articles. (These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)
  • Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 (CVE-2017-5715 – Branch Target Injection).
  • Provides protections against an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore (CVE-2018-3665) for 32-Bit (x86) versions of Windows.

The full update also has the following Known Issues:

SymptomWorkaround
There is an issue with Windows and third-party software that is related to a missing file (oem.inf). Because of this issue, after you apply this update, the network interface controller will stop working.
  1. To locate the network device, launch devmgmt.msc; it may appear under Other Devices.
  2. To automatically rediscover the NIC and install drivers, select Scan for Hardware Changes from the Action menu.
    a. Alternatively, install the drivers for the network device by right-clicking the device and selecting Update. Then select Search automatically for updated driver software or Browse my computer for driver software.

The security-only update is KB4343899 (with no known issues) can be downloaded here. The full version can be manually downloaded here.

Microsoft is also pushing out KB4343898  to Windows 8.1 or Windows Server 2012 R2, which brings:

  • Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel® Core® processors and Intel® Xeon® processors (CVE-2018-3620 and CVE-2018-3646). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the Windows Client and Windows Server guidance KB articles. (These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS Editions.)
  • Ensures that Internet Explorer and Microsoft Edge support the preload=”none” tag.
  • Addresses an issue that may prevent your device from starting up properly if you install KB3033055 (released September 2015) after installing any Monthly Rollup dated November 2017 or later.

A version with just security updates can be downloaded here or the full KB4343898 can downloaded here.

For Windows Server 2012 (not R2), Microsoft is sending out KB4343901, which brings:

  • Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel® Core® processors and Intel® Xeon® processors (CVE-2018-3620 and CVE-2018-3646). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the Windows Server guidance KB article. (These registry settings are disabled by default for Windows Server OS editions.)
  • Provides protections against an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore (CVE-2018-3665) for 32-Bit (x86) versions of Windows.

The security-only update is KB4343896 can be manually downloaded here. The full update can be manually downloaded here.

Via Neowin.net

Some links in the article may not be viewable as you are using an AdBlocker. Please add us to your whitelist to enable the website to function properly.

Related
Comments