{"id":11234,"date":"2018-01-25T10:30:02","date_gmt":"2018-01-25T18:30:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/25\/news-5005\/"},"modified":"2018-01-25T10:30:02","modified_gmt":"2018-01-25T18:30:02","slug":"news-5005","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/25\/news-5005\/","title":{"rendered":"Microsoft Patch Alert: Lots of lingering problems in a very messy month"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2016\/11\/windows-bug-100692311-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 25 Jan 2018 10:00:00 -0800<\/strong><\/p>\n<p>On the heels of a relatively benevolent December Patch Tuesday, the stream of patches pouring out of Microsoft (and Intel!) in January reached epic proportions. To be fair, it looks as if Microsoft got drawn into releasing its <a href=\"https:\/\/www.computerworld.com\/article\/3246028\/microsoft-windows\/win7-monthly-rollup-kb-4056894-signals-early-abbreviated-patch-tuesday.html\">Meltdown\/Spectre barrage<\/a> early \u2013 on Jan. 3 \u2013 but they were so buggy they were withdrawn for AMD processors <a href=\"https:\/\/www.computerworld.com\/article\/3246188\/microsoft-windows\/microsoft-yanks-buggy-windows-meltdown-spectre-patches-for-amd-computers.html\">on Jan. 8<\/a>, and gradually re-released in phases over the next two weeks.<\/p>\n<p>If you had Automatic Update turned on, and you\u2019re running an AMD machine that\u2019s more than a couple of years old, chances are good that you woke up to a blue screen, and restoring your system took two magic incantations and an Act of Congress. Tens of thousands \u2013 possibly hundreds of thousands \u2013 of AMD machines may have been bricked by this month\u2019s patches. But be of good cheer. Microsoft released\u00a0 <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073578\/unbootable-state-for-amd-devices-in-windows-7-sp1-windows-server-2008\" rel=\"nofollow\">KB 4073578<\/a> (\u201cUnbootable state for AMD devices in Windows 7 SP1 and Windows Server 2008 R2 SP1\u201d) and <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073576\/unbootable-state-for-amd-devices-windows-8-1-windows-server-2012-r2\" rel=\"nofollow\">KB 4073576<\/a> (same for Win8.1 and Server 2012 R2) to fix your problem. Of course, you have to be able to boot your computer to install the updates.<\/p>\n<p>Never mind.<\/p>\n<p>Then there\u2019s .NET.<\/p>\n<p>So far this month, we\u2019ve seen patches roll out like this:<\/p>\n<p>That is an enormous pile of patches; even the folks who are paid to watch patches full time are confused.<\/p>\n<p>Not to be outdone by Microsoft, Intel created mayhem by releasing, <a href=\"https:\/\/www.computerworld.com\/article\/3250250\/malware-vulnerabilities\/belay-that-order-intel-says-you-should-not-install-its-meltdown-firmware-fixes.html\">then yanking<\/a>, its Meltdown\/Spectre BIOS and UEFI firmware patches for <a href=\"https:\/\/www.computerworld.com\/article\/3250297\/microsoft-windows\/let-the-biosuefi-firmware-recall-begin.html\">almost every Intel computer<\/a> released in the past five years. Intel\u2019s documentation rivals that of Microsoft for ambiguity, hyperbole, and obfuscation.<\/p>\n<p>Here are the latest links to BIOS\/UEFI Meltdown\/Spectre recall advice from the major hardware manufacturers:<\/p>\n<p>If you have new information about any of those vendors, please let me know on the <a href=\"https:\/\/www.askwoody.com\/2018\/patch-alert-there-are-still-lots-of-problems-with-the-january-patches\/\" rel=\"nofollow\">AskWoody Lounge<\/a>.<\/p>\n<p>No matter which version of Windows you patch, you need to <a href=\"https:\/\/www.computerworld.com\/article\/3246633\/microsoft-windows\/a-mess-of-microsoft-patches-warnings-about-slowdowns-and-antivirus-proves-crucial.html\">get your antivirus program<\/a> to signal to Windows that it\u2019s compatible with this month\u2019s updates.<\/p>\n<p>The Win10 Fall Creators Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073291\/january-18-2018-kb4073291-os-build-16299-201\" rel=\"nofollow\">patch on Jan. 18<\/a> seems to have shaken out the major problems with <strong>Win10 1709<\/strong>.<\/p>\n<p>The Win10 Creators Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4057144\" rel=\"nofollow\">patch on Jan. 17<\/a>, similarly, seems to fix the outstanding problems with this month\u2019s changes to <strong>Win10 1703<\/strong>. That patch, KB 4057144, has to be downloaded and installed manually.<\/p>\n<p>The Win10 Anniversary Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4057142\" rel=\"nofollow\">patch on Jan. 17<\/a> \u2013 again, manual install only \u2013 fixes a bunch of bugs in <strong>Win10 1607<\/strong>, but it also clobbers Windows Defender Credential Guard (which you <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/access-protection\/credential-guard\/credential-guard\" rel=\"nofollow\">probably don\u2019t use<\/a>).<\/p>\n<p>With the release of <a href=\"https:\/\/www.askwoody.com\/2018\/microsoft-release-fix-for-bug-that-crashes-win8-1-machines-running-both-pic-and-apic-controllers\/\" rel=\"nofollow\">KB 4077561<\/a> on Jan. 24, Microsoft has fixed many of the acknowledged problems with this month\u2019s Monthly Rollup and Security-Only (manual installation) patches for <strong>Win7<\/strong> and <strong>Win8.1<\/strong>. That said, there\u2019s still a <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/more-problems-with-this-months-patches\/#post-161905\" rel=\"nofollow\">great deal of debate<\/a> about the proper installation sequence of patches, re-patches and old patches. As usual, Microsoft hasn\u2019t said anything.<\/p>\n<p>This looks like a mess. You can get the details in my <a href=\"https:\/\/www.computerworld.com\/article\/3249767\/microsoft-windows\/patching-meltdown-windows-fixes-sloppy-net-warnings-about-word-and-outlook.html\">Jan. 19 column<\/a>, but the basic idea is that the original .NET patches for .NET 4.6\/4.6.1\/4.6.2\/4.7\/4.7.1 were all bad, and have to be augmented by additional patches. The <a href=\"https:\/\/github.com\/dotnet\/announcements\/issues\/53\" rel=\"nofollow\">font problems<\/a> in the original patches have been fixed in general, but only if you <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4074880\/description-of-the-security-and-quality-rollup-for-net-framework-4-6-4\" rel=\"nofollow\">install these latest patches<\/a>.<\/p>\n<p>Then there\u2019s the Fixit tool <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4074906\/typeinitializationexception-or-fileformatexception-error-in-wpf-apps-t\" rel=\"nofollow\">KB 4074906<\/a> that fixes \u201cWindows Presentation Foundation (WPF) applications that request a fallback font or a character that is not included in the currently selected font.\u201d<\/p>\n<p>It appears as if the Office 2016 patch KB 3178662 throws an <a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/windows_10-update\/update-for-microsoft-office-2016-kb3178662-64-bit\/c1bf5c01-3552-4fb1-ac38-979ed5d3d317\" rel=\"nofollow\">installation error<\/a> 0x8007006e. The Office folks, who are usually good about acknowledging problems, haven\u2019t picked this one up yet. Solution? Uninstall &#8220;Microsoft Office Proofing Tools Kit Compilation 2016.\u201d<\/p>\n<p>There\u2019s a <a href=\"https:\/\/support.office.com\/en-us\/article\/Fixes-or-workarounds-for-recent-issues-in-Outlook-for-Windows-ecf61305-f84f-4e13-bb73-95a214ac1230?ui=en-US&amp;rs=en-US&amp;ad=US\" rel=\"nofollow\">laundry list<\/a> of acknowledged problems with Outlook: To-Do Bar and Task List view not displaying events; Unable to &#8220;Save All Attachments&#8221; to a shared network drive; No Search results found when using All Mailboxes; Find Related option does not show results; Outlook 2010 will not start on WinXP after January updates. The bug that prevented Outlook 2016 from forwarding files attached to text messages was fixed on Jan. 24.<\/p>\n<p>Wait.<\/p>\n<p>If you have an irresistible urge to click \u201cEnable Edits\u201d on bogus Word documents, you can <a href=\"https:\/\/www.computerworld.com\/article\/3246633\/microsoft-windows\/a-mess-of-microsoft-patches-warnings-about-slowdowns-and-antivirus-proves-crucial.html\">disable Equation Editor<\/a> with a quick registry hack. Other than that, as long as you don\u2019t use IE or Edge, there\u2019s absolutely no reason to dive into the roiling mess of January updates.<\/p>\n<p>In spite of the \u201cSky is falling\u201d screams online, there\u2019s no sign a single PC has been compromised by the Meltdown or Spectre vulnerabilities. Contrast that to the multitudes of machines that\u2019ve been bricked by bad patches, and the untold users wondering why they have to unwind this month\u2019s firmware updates.<\/p>\n<p>The long and short of it: If you installed any of this month\u2019s patches from Microsoft or your PC manufacturer, you joined the swelling ranks of unpaid beta testers. If your machine\u2019s still working, thank your lucky stars.<\/p>\n<p>There\u2019s a reason why I recommend you <a href=\"https:\/\/www.computerworld.com\/article\/3213929\/microsoft-windows\/the-case-against-windows-automatic-update.html\">turn off Automatic Update and wait<\/a> for carnage to clear before installing the latest missives.<\/p>\n<p><em>Group therapy for patchers continues on the <\/em><a href=\"https:\/\/www.askwoody.com\/2018\/patch-alert-there-are-still-lots-of-problems-with-the-january-patches\/\" rel=\"nofollow\"><em>AskWoody Lounge<\/em><\/a><em>.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-lots-of-lingering-problems-in-a-very-messy-month.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2016\/11\/windows-bug-100692311-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 25 Jan 2018 10:00:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>On the heels of a relatively benevolent December Patch Tuesday, the stream of patches pouring out of Microsoft (and Intel!) in January reached epic proportions. To be fair, it looks as if Microsoft got drawn into releasing its <a href=\"https:\/\/www.computerworld.com\/article\/3246028\/microsoft-windows\/win7-monthly-rollup-kb-4056894-signals-early-abbreviated-patch-tuesday.html\">Meltdown\/Spectre barrage<\/a> early \u2013 on Jan. 3 \u2013 but they were so buggy they were withdrawn for AMD processors <a href=\"https:\/\/www.computerworld.com\/article\/3246188\/microsoft-windows\/microsoft-yanks-buggy-windows-meltdown-spectre-patches-for-amd-computers.html\">on Jan. 8<\/a>, and gradually re-released in phases over the next two weeks.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-lots-of-lingering-problems-in-a-very-messy-month.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10761],"class_list":["post-11234","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows-10"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11234"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11234\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11234"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}