{"id":12778,"date":"2018-07-12T06:31:04","date_gmt":"2018-07-12T14:31:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/07\/12\/news-6546\/"},"modified":"2018-07-12T06:31:04","modified_gmt":"2018-07-12T14:31:04","slug":"news-6546","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/07\/12\/news-6546\/","title":{"rendered":"Patch Tuesday problems abound, Server 2016 crashes, and a .Net patch goes down in flames"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 12 Jul 2018 06:18:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">You know it\u2019s going to be an Alice in Wonderland month when some sites report that Microsoft plugged 54 vulnerabilities on Patch Tuesday, while others report 53. Fact is, patching has become so brutal \u2014 and so banal \u2014 that there\u2019s no consensus on counting, much less on what\u2019s good and bad.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Suffice to say that, once again this month, there was a huge number of security patches (129 individual patches, according to the <\/span><a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=2018-07\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Microsoft Update Catalog<\/span><\/a><span style=\"font-weight: 400;\">), with no pressing security fixes unless you\u2019re using the Edge browser or Internet Explorer. Microsoft changed Win10 version 1803 to \u201cSemi-Annual Channel,\u201d but the term now means less than it ever has before. If that\u2019s possible.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moral of the story: Don\u2019t use IE or Edge, and wait a few weeks to see if any of the other patches blow up \u2014 which is pretty close to the same Patch Tuesday advice I\u2019ve doled out monthly for the past year.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For a comprehensive listing of all the patches, see <\/span><a href=\"https:\/\/www.ghacks.net\/2018\/07\/10\/microsoft-windows-security-updates-july-2018-release-overview\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Martin Brinkmann\u2019s list on Ghacks<\/span><\/a><span style=\"font-weight: 400;\">. For the best in-depth analysis, see Dustin Childs\u2019s review on the <\/span><a href=\"https:\/\/www.thezdi.com\/blog\/2018\/7\/10\/the-july-2018-security-update-review\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Zero Day Initiative blog<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The SANS<\/span><a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft+Patch+Tuesday+July+2018+now+with+Dashboard\/23858\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">Internet Storm Center<\/span><\/a><span style=\"font-weight: 400;\"> says there are no known exploits for any of the patches, although three of the exploits have been disclosed to the patching community. None of the three is particularly interesting, unless you use Edge.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are \u201ccritical\u201d fixes for Edge (12 critical) and Internet Explorer (four critical), but no \u201ccritical\u201d fixes for any Windows version. It still amazes me how many major security problems crop up, month after month, for Edge.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our evergreen snooping patches, KB 2952664 for Win7 and KB 2976978 for Win8.1 make a reappearance, this time marked \u201cImportant,\u201d checked and ready to load. Similarly, <\/span><a href=\"https:\/\/borncity.com\/win\/2018\/02\/10\/windows-10-reliability-update-kb4023057-02-08-2018\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4023057<\/span><\/a><span style=\"font-weight: 400;\">\u00a0\u2014 an <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/microsoft-releases-new-version-of-win10-patch-kb-4023057\/#post-174206\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">\u201cupdate reliability\u201d patch<\/span><\/a><span style=\"font-weight: 400;\"> for older Win10 versions \u2014 has appeared again. Unless you want Microsoft to push you to a new version of Windows, you don\u2019t need or want them \u2014 they only <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/2952664-telemetry-in-win78-1-kb2952664-kb2977759-kb2976978-kb3150513\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">shuffle more telemetry data<\/span><\/a><span style=\"font-weight: 400;\"> off to Microsoft.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The craziest Patch Tuesday blip wasn\u2019t a patch at all. Win10 April 2018 update \u2014 good ol\u2019 version 1803 \u2014 now appears in the <\/span><a href=\"https:\/\/www.microsoft.com\/en-us\/itpro\/windows-10\/release-information\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Windows 10 release information<\/span><\/a><span style=\"font-weight: 400;\"> list as \u201cSemi-Annual Channel.\u201d What\u2019s more the <\/span><a href=\"https:\/\/www.askwoody.com\/2018\/patch-lady-is-1803-really-semi-annual\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">bizarre blurb that appeared<\/span><\/a><span style=\"font-weight: 400;\"> as a footnote in that post on Tuesday morning is now gone:<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> (1) Windows 10, version 1803 designation has been updated to reflect the servicing option available in the operating system and to reflect existing deferral policies. We recommend organizations broadly deploy the latest version of Windows 10 when they are ready, and not wait until the \u201cTargeted\u201d designation has been removed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2026 surely one of the worst cases of Microsoft bafflegab ever.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On June 14, <\/span><a href=\"https:\/\/blogs.windows.com\/windowsexperience\/2018\/06\/14\/ai-powers-windows-10-april-2018-update-rollout\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Microsoft declared<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Based on the update quality and reliability we are seeing through our AI approach, we are now expanding the release broadly to make the April 2018 Update (version 1803) fully available for all compatible devices running Windows 10 worldwide. Full availability is the final phase of our rollout process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, it seems, version 1803 has been kicked up from \u201c(Targeted)\u201d to, uh, &#8220;Not (Targeted)&#8221; \u2014 without fanfare, and with no explanation. How &#8220;Not (Targeted)&#8221; differs from \u201cfully available\u201d remains a mystery.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s the best way I found to parse the current announcement:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At least, I think that\u2019s what it means. Neither the \u201creflect existing deferral policies\u201d footnote in the old KB article nor the June 14 declaration of \u201cfully available for all compatible devices\u201d mean much of anything, as best I can tell. Marketing pabulum.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you want to keep 1803 off your machine, make sure the <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3232632\/microsoft-windows\/how-to-block-windows-10-april-2018-update-from-installing.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">feature deferral setting is large<\/span><\/a><span style=\"font-weight: 400;\">. And pray that Microsoft doesn\u2019t go rogue on forced updates again.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019re slowly unraveling this knot on the <\/span><a href=\"https:\/\/www.askwoody.com\/2018\/what-exactly-does-the-switch-in-win10-1803-from-semi-annual-channel-targeted-to-semi-annual-channel-not-targeted-really-mean\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yet another patch that never should\u2019ve made it through quality control: The <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4338814\/windows-10-update-kb4338814\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4338814 article<\/span><\/a><span style=\"font-weight: 400;\"> says:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After installing this update on a DHCP Failover Server, Enterprise clients may receive an invalid configuration when requesting a new IP address. This may result in loss of connectivity as systems fail to renew their leases. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Currently, there is no workaround for this issue. Microsoft is working on a resolution and estimates a solution will be available mid-July.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The patch was reissued on July 11, but it looks like there was only a change in detection logic (\u201cmetadata\u201d). An <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/july-2018-security-patches-are-out\/#post-202994\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">anonymous poster on AskWoody<\/span><\/a><span style=\"font-weight: 400;\"> says it was yanked from WSUS. There\u2019s an \u2026 entertaining \u2026 <\/span><a href=\"https:\/\/www.reddit.com\/r\/sysadmin\/comments\/8xy9nz\/so_explain_me_why_kb4338814_another_windows\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">thread on Reddit<\/span><\/a><span style=\"font-weight: 400;\"> that blasts Microsoft for releasing a patch that, knowingly, blows away fundamental Server functions. What on earth is Microsoft thinking?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Permit me to rephrase that. <\/span><strong><i>Is<\/i><\/strong><span style=\"font-weight: 400;\"> Microsoft thinking?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you tried to install KB 4340558, the \u201cSecurity and Quality Rollup updates for .Net Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 for Windows 8.1, RT 8.1, and Server 2012 R2\u201d and had it crash with an error <\/span><span style=\"font-weight: 400;\">0x80092004, you aren\u2019t alone. AskWoody poster <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/july-2018-security-patches-are-out\/#post-202787\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">macauln82 says<\/span><\/a><span style=\"font-weight: 400;\"> he\u2019s seen it happen on all of his Server 2012 R2 machines. G\u00fcnter Born has a <\/span><a href=\"https:\/\/borncity.com\/win\/2018\/07\/11\/net-framework-update-kb4340558-drops-error-0x80092004\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">detailed explanation<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">@abbodi86 offers <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/july-2018-security-patches-are-out\/#post-202831\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">this explanation and fix<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s caused by the .NET 4.x rollup component <\/span><a href=\"https:\/\/support.microsoft.com\/en-sg\/help\/4338419\/description-of-the-security-and-quality-rollup-updates-for-net-framewo\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4338419<\/span><\/a><span style=\"font-weight: 400;\">, which somehow conflicts with the last two rollups <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4229727\/description-of-preview-of-quality-rollup-for-net-framework\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4229727 <\/span><\/a><span style=\"font-weight: 400;\">(the Preview from June) and <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4096417\/description-of-the-security-and-quality-rollup-for-net-framework-4-6-4\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4096417<\/span><\/a><span style=\"font-weight: 400;\"> (the May rollup). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The solution: Uninstall KB 4229727 &amp; KB 4096417, then clean up the leftovers by running<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dism \/Online \/NoRestart \/Cleanup-Image \/StartComponentCleanup<\/span><\/p>\n<p><span style=\"font-weight: 400;\">(you may also run Disk Cleanup &gt; Windows Update Cleanup)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Reboot and KB 4338419 will install successfully.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to an <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/july-2018-security-patches-are-out\/#post-202700\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">anonymous poster <\/span><\/a><span style=\"font-weight: 400;\">on AskWoody:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re on Windows 10 1803, Windows Update takes care of the botched up .NET 4.7.2 release shipped with that Windows version. If .NET 4.7.2 was installed before today on a previous Windows version, make sure to check out the <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4054530\/microsoft-net-framework-4-7-2-offline-installer-for-windows\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">offline installer <\/span><\/a><span style=\"font-weight: 400;\">and reinstall again from the updated installer! Re-running the updated .NET 4.7.2 should not cause any issues. In order to re-install .NET 4.7.2 without reboot, make sure to shut down all .NET apps (including Web apps running in IIS) before running the installer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the .NET 4.7.2 SDK was installed before today as well, make sure to <\/span><a href=\"https:\/\/www.microsoft.com\/net\/download\/visual-studio-sdks\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">download it<\/span><\/a><span style=\"font-weight: 400;\"> and reinstall again.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This .Net patch is also failing, with the same error code, in Windows 8.1. That\u2019s a remarkable achievement because Win8.1 continues to be the most stable version of Windows available.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The old Win7 NIC problem \u2014 introduced by a <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3286217\/microsoft-windows\/get-the-microsoft-june-patches-applied-but-watch-out-for-win7-nics-and-old-antivirus.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">security patch in March<\/span><\/a><span style=\"font-weight: 400;\">\u00a0\u2014 still hasn\u2019t been fixed. The KB article says:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Symptom: There is an issue with Windows and a third-party software that is related to a missing file (<\/span><i><span style=\"font-weight: 400;\">oem&lt;number&gt;.inf<\/span><\/i><span style=\"font-weight: 400;\">). Because of this issue, after you apply this update, the network interface controller will stop working.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Workaround:<\/span><\/p>\n<p style=\"padding-left: 60px;\"><span style=\"font-weight: 400;\">a. Alternatively, install the drivers for the network device by right-clicking the device and choosing <\/span><strong>Update<\/strong><span style=\"font-weight: 400;\">. Then choose <\/span><strong>Search automatically for updated driver software<\/strong><span style=\"font-weight: 400;\"> or <\/span><strong>Browse my computer for driver software<\/strong><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you can figure out that logic, yer a better hack than me, Gunga Din.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I\u2019m beginning to think that Microsoft <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/july-2018-security-patches-are-out\/#post-202759\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">won\u2019t ever fix<\/span><\/a><span style=\"font-weight: 400;\"> this NIC problem. If it decides to pass on a solution, I hope Microsoft just comes out and says it, instead of burying the decision and <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3282066\/microsoft-windows\/microsoft-quietly-cuts-off-win7-support-for-older-intel-computers.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">doctoring old documentation<\/span><\/a><span style=\"font-weight: 400;\"> to cover it up. It&#8217;d be nice if Microsoft would identify the offending NICs as well. Let&#8217;s hear it for transparency.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month marked a re-re-re\u2026-appearance of the <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3254779\/microsoft-windows\/february-patches-bring-ominous-outlook-fixes-and-a-rebirth-of-kb-2952664.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">snooping patches KB 2952664 for Win7 and KB 2976978 for Win8.1<\/span><\/a><span style=\"font-weight: 400;\">. You remember the Microsoft Party Line:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This update performs diagnostics on the Windows systems that participate in the Windows Customer Experience Improvement Program. The diagnostics evaluate the compatibility status of the Windows ecosystem, and help Microsoft to ensure application and device compatibility for all updates to Windows. There is no GWX or upgrade functionality contained in this update. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Poster Bill C has a <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/july-2018-security-patches-are-out\/#post-202913\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">good take <\/span><\/a><span style=\"font-weight: 400;\">on the claim:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They say they will not do GWX again, OK, but the real question is what WILL they do?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ve seen, over and over again, that the Customer Experience Improvement Program settings have no bearing on these patches\u2019 increased telemetry. If you\u2019re even remotely tempted to install either of these \u201cimportant,\u201d checked patches, see @PKCano\u2019s AskWoody KB article on the subject, <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/2952664-telemetry-in-win78-1-kb2952664-kb2977759-kb2976978-kb3150513\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">AKB 2952664<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">ProTip: Microsoft has no incentive to improve Win7. None. Unless you\u2019re offered a clearly identified security patch, you don\u2019t want it, checked or not.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Remember the Win10 \u201cdelta\u201d updates? The ones that <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3232095\/microsoft-windows\/microsoft-patch-problems-persist-bad-release-sequences-crm-blocks-and-more.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">bricked many machines<\/span><\/a><span style=\"font-weight: 400;\"> last October? \u00a0Now comes word that the experiment didn\u2019t work. Or, at least, there\u2019s a better alternative. Mike Benson, on the official <\/span><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-IT-Pro-Blog\/Windows-10-quality-updates-explained-amp-the-end-of-delta\/ba-p\/214426\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Windows IT Pro blog<\/span><\/a><span style=\"font-weight: 400;\">, says:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We plan to stop shipping delta updates. Beginning February 12, 2019 Microsoft will end its practice of creating delta updates for all versions of Windows 10. Express updates are much smaller in size, and simplifying the cumulative options available will reduce complexity for IT administrators.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@PKCano reports:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Updating my 1703 VM today (CU KB4338826, IE11 Flash, MSRT and C++) when I \u00a0got a popup saying \u201cYour Windows Update is not working properly. You need the Update Facilitation Service. Click OK below.\u201d <\/span><\/p>\n<p><strong>Oh, no you don\u2019t<\/strong><span style=\"font-weight: 400;\">! I clicked on the \u201cX\u201d and closed the box \u2013 it was not then listed in the downloaded updates.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are several Servicing Stack Updates this month. If you are going to install the Win10 updates manually, make sure you <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/july-2018-security-patches-are-out\/#post-202669\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">install the Servicing Stack Update <\/span><\/a><span style=\"font-weight: 400;\">first:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s no new SSU for Win10 version 1703. At least, not yet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Obviously, it\u2019s much too early to install the July patches \u2014 unless you want to join the ranks of the unpaid beta testers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thx to @PKCano, @BillC, @abbodi86, @NibbledToDeathByDucks and many more<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Abandon hope all ye who enter the <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2018\/the-big-bug-rollup-many-problems-few-solutions-with-bugs-in-the-july-patch-tuesday-crop\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3289506\/microsoft-windows\/patch-tuesday-problems-abound-server-2016-crashes-and-a-net-patch-goes-down-in-flames.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 12 Jul 2018 06:18:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">You know it\u2019s going to be an Alice in Wonderland month when some sites report that Microsoft plugged 54 vulnerabilities on Patch Tuesday, while others report 53. Fact is, patching has become so brutal \u2014 and so banal \u2014 that there\u2019s no consensus on counting, much less on what\u2019s good and bad.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Suffice to say that, once again this month, there was a huge number of security patches (129 individual patches, according to the <\/span><a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=2018-07\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Microsoft Update Catalog<\/span><\/a><span style=\"font-weight: 400;\">), with no pressing security fixes unless you\u2019re using the Edge browser or Internet Explorer. Microsoft changed Win10 version 1803 to \u201cSemi-Annual Channel,\u201d but the term now means less than it ever has before. If that\u2019s possible.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3289506\/microsoft-windows\/patch-tuesday-problems-abound-server-2016-crashes-and-a-net-patch-goes-down-in-flames.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10525],"class_list":["post-12778","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12778"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12778\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12778"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}