{"id":12132,"date":"2018-04-25T12:30:05","date_gmt":"2018-04-25T20:30:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/25\/news-5901\/"},"modified":"2018-04-25T12:30:05","modified_gmt":"2018-04-25T20:30:05","slug":"news-5901","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/04\/25\/news-5901\/","title":{"rendered":"Microsoft Patch Alert: April patches infested with bugs, but most are finally contained"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security3-100734732-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 25 Apr 2018 12:06:00 -0700<\/strong><\/p>\n<p>People think I\u2019m joking when I refer to bug fixing as Microsoft\u2019s next billion-dollar business. I\u2019m not. This month woefully demonstrated why patching Windows has become much bigger \u2013 and more critical \u2013 than developing new versions. Microsoft\u2019s hell-bent move to bring out new versions of Windows twice a year \u201cas a service\u201d makes things worse, but quality control problems dog patches to every version of Windows. Except, arguably, Windows 8.1.<\/p>\n<p>In April, we\u2019ve seen a return to two massive cumulative updates per month for all supported versions of Windows 10. The second cumulative update, with luck, fixes the bugs in the first cumulative update. Windows 7 turned into a fiery pit when it was discovered in late March that <strong><em>every\u00a0<\/em><\/strong>patch to Win7 (and Server 2008R2) pushed out this year enables the Total Meltdown bug. Fortunately, by April 23, we finally saw some stability return to the process.<\/p>\n<p>If you\u2019re using Windows 10, you saw big multiple patches in April:<\/p>\n<p>There was yet another update for Win10 1709, 1703 and 1607 released on April 24. <a href=\"https:\/\/support.microsoft.com\/en-sg\/help\/4078407\/update-to-enable-mitigation-against-spectre-variant-2\" rel=\"noopener nofollow\" target=\"_blank\">KB 4078407<\/a> is supposed to be the software side of the fix for Spectre variant 2. It has to be combined with microcode updates to work and it\u2019s only available by download from the <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4078407\" rel=\"noopener nofollow\" target=\"_blank\">Microsoft Update Catalog<\/a>. We\u2019re following its progress closely <a href=\"https:\/\/www.askwoody.com\/2018\/so-tell-me-again-whats-happening-with-the-two-new-spectre-v2-patches-kb-4078407-and-kb-4091666\/\" rel=\"noopener nofollow\" target=\"_blank\">on AskWoody<\/a>.<\/p>\n<p>Of course we\u2019re all waiting for Win10 version 1803 to appear. There\u2019s still no word on when that might happen, or what it\u2019ll be called. (Inveterate leaker Faikee points to a <a href=\"https:\/\/twitter.com\/FaiKeeF\/status\/989094941824638976\" rel=\"noopener nofollow\" target=\"_blank\">Chinese-language letter to dealers<\/a> saying it\u2019ll be released May 9.)<\/p>\n<p>Two words: Total Meltdown. We now know that every 64-bit Windows 7 and Server 2008 R2 patch released this year, up to March 29, contained a bug that opens a <a href=\"https:\/\/www.computerworld.com\/article\/3269003\/microsoft-windows\/heads-up-total-meltdown-exploit-code-now-available-on-github.html\">security hole dubbed Total Meltdown<\/a>. Microsoft spent most of April in Keystone Kops patching mode, where one patch after another introduced more and different bugs, and new patches replaced older patches at a truly mind-boggling rate.<\/p>\n<p>As the month\u2019s now winding down, there\u2019s a bit of good news. As of Monday night, it appears as if the (re-re-re-released) April Monthly Rollup, KB 4093118, has <a href=\"https:\/\/www.askwoody.com\/2018\/patch-lady-mr-metadata-got-fixed\/\" rel=\"noopener nofollow\" target=\"_blank\">lost its boorish tendency to re-re-re-install itself<\/a>. That means, to a first approximation, Win7 and Server 2008 R2 users can install one patch and wipe out the Total Meltdown threat.<\/p>\n<p>All of this is unfolding as a real, live working <a href=\"https:\/\/www.computerworld.com\/article\/3269003\/microsoft-windows\/heads-up-total-meltdown-exploit-code-now-available-on-github.html\">Total Meltdown exploit<\/a> is in the works. Of course, Meltdown (as opposed to Total Meltdown) and Spectre have absolutely no known exploits. None.<\/p>\n<p>Those who insist on installing Security-only patches, eschewing the Monthly Rollups, face an unanswered question: If you\u2019ve installed the earlier, buggy version of the NIC and static-IP defending patch KB 4099950, do you need to uninstall it before proceeding? The official documents are mum. We\u2019re also following <a href=\"https:\/\/www.askwoody.com\/2018\/a-protocol-question-about-kb-4099950\/\" rel=\"noopener nofollow\" target=\"_blank\">that question on AskWoody<\/a>.<\/p>\n<p>There continue to be reports from people who installed this month\u2019s updates and had to struggle with recovering their user profile. Microsoft acknowledged the problem, of and on, and even posted a <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/947215\/you-receive-a-the-user-profile-service-failed-the-logon-error-message\" rel=\"noopener nofollow\" target=\"_blank\">Knowledge Base article<\/a> with workaround steps.<\/p>\n<p>There don\u2019t appear to be any pressing problems with this month\u2019s Office patches. Susan Bradley\u2019s <a href=\"https:\/\/www.askwoody.com\/patch-list-master\/\" rel=\"noopener nofollow\" target=\"_blank\">Master Patchwatch List<\/a> gives them a clean bill of health, although there are a number of acknowledged problems listed on the <a href=\"https:\/\/support.office.com\/en-us\/article\/fixes-or-workarounds-for-recent-issues-in-outlook-for-windows-ecf61305-f84f-4e13-bb73-95a214ac1230?ui=en-US&amp;rs=en-US&amp;ad=US\" rel=\"noopener nofollow\" target=\"_blank\">official Fixes pages<\/a>.<\/p>\n<p>In short, it looks like Microsoft has fixed the problems that it introduced earlier in the month. The fixes to security holes Microsoft installed with this year\u2019s Win7 and Server 2008 R2 are almost ready. We just have a couple of niggling problems before it\u2019s time to get the March patches installed.<\/p>\n<p>Stay tuned.<\/p>\n<p><em>Join us for the latest on the <\/em><em><a href=\"https:\/\/www.askwoody.com\/2018\/patch-alert-april-patches-infested-with-a-slew-of-bugs-most-of-which-were-finally-contained\/\" rel=\"noopener nofollow\" target=\"_blank\">AskWoody Lounge<\/a>.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-april-patches-infested-with-bugs-but-most-are-finally-contained.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security3-100734732-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 25 Apr 2018 12:06:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>People think I\u2019m joking when I refer to bug fixing as Microsoft\u2019s next billion-dollar business. I\u2019m not. This month woefully demonstrated why patching Windows has become much bigger \u2013 and more critical \u2013 than developing new versions. Microsoft\u2019s hell-bent move to bring out new versions of Windows twice a year \u201cas a service\u201d makes things worse, but quality control problems dog patches to every version of Windows. Except, arguably, Windows 8.1.<\/p>\n<p>In April, we\u2019ve seen a return to two massive cumulative updates per month for all supported versions of Windows 10. The second cumulative update, with luck, fixes the bugs in the first cumulative update. Windows 7 turned into a fiery pit when it was discovered in late March that <strong><em>every\u00a0<\/em><\/strong>patch to Win7 (and Server 2008R2) pushed out this year enables the Total Meltdown bug. Fortunately, by April 23, we finally saw some stability return to the process.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-april-patches-infested-with-bugs-but-most-are-finally-contained.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10525],"class_list":["post-12132","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12132"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12132\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12132"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}