{"id":12831,"date":"2018-07-17T08:30:04","date_gmt":"2018-07-17T16:30:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/07\/17\/news-6598\/"},"modified":"2018-07-17T08:30:04","modified_gmt":"2018-07-17T16:30:04","slug":"news-6598","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/07\/17\/news-6598\/","title":{"rendered":"Stung by a festering pile of bugs on Patch Tuesday, MS releases 27 more patches"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Tue, 17 Jul 2018 09:21:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">In what is becoming a common occurrence, Microsoft\u2019s Patch Tuesday brought along so many bugs that they necessitated a remediation round. This month, unusually, it took only six days to get the exterminators out. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since these fixes are aimed at four specific bugs introduced on Patch Tuesday, they don\u2019t include the massive patches normally appearing on the second Patch Whateverday of the month. My guess is we\u2019ll see at least one more big set of Windows patches before the month is out. Oh, boy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yesterday, Monday, July 16, Microsoft released 27 new security patches for Windows, bringing the total number of <\/span><a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=2018-07\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">patches so far this month<\/span><\/a><span style=\"font-weight: 400;\"> up to 156. The new patches fall into six separate groups:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All six of the groups say they fix the same basic bugs. Er, issues. All of the acknowledged issues look like this:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Win10 1703, Win8.1 and Win7 don\u2019t list the DHCP Failover bug. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yes, you read that correctly. If you installed <\/span><strong><i>any <\/i><\/strong><span style=\"font-weight: 400;\">of the Patch Tuesday patches for Windows, you got hit with at least three of those bugs. They won&#8217;t affect most of you. But for folks relying on those specific features, the bugs are deadly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How bad was it? On Sunday \u2014 five days after the buggy Patch Tuesday swarm came out of the underground \u2014 the Microsoft Exchange Team blog posted a <\/span><a href=\"https:\/\/blogs.technet.microsoft.com\/exchange\/2018\/07\/16\/issue-with-july-updates-for-windows-on-an-exchange-server\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">candidate evaluation<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Exchange team is aware of issues with the Windows Operating System updates published July 10th, 2018, causing Exchange to not function correctly. The Windows servicing team has advised us that they will be releasing updates to the affected packages. We encourage Exchange customers to delay applying the July 10th updates, including the security updates released on the same date, on to an Exchange server until the updated packages are available.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s a good warning, but if you weren\u2019t perusing the Exchange Team blog on a Sunday afternoon, you may have missed it. Gawrsh.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you head over to Windows Update right now (ProTip: <strong>DON\u2019T<\/strong>), you may or may not find the July updates waiting. There\u2019s at least <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/microsoft-just-released-27-new-security-patches\/#post-203976\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">one report<\/span><\/a><span style=\"font-weight: 400;\"> that you have to install last month\u2019s Preview before you can see the Patch Tuesday Win7 Monthly Rollup. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yet another reason to hold off on installing this month\u2019s Win7 patch. As if you needed another one. G\u00fcnter Born <\/span><a href=\"https:\/\/borncity.com\/win\/2018\/07\/17\/iis-web-server-strikes-after-update-kb4338818\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">reports on his blog<\/span><\/a><span style=\"font-weight: 400;\"> about a reader who says:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After those recent updates, web servers are also not functioning well. When restarting a server under IIS, the server refuses to start again unless you do a reboot. Also all our custom services listening to a socket refuse to restart.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Is anyone also having these issues? For a quick troubleshooting, I uninstalled KB4338818 and issue went away.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Life as a server administrator dealing with broken updates s*cks!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Born also reports that some Apache servers get stomped, too. It isn\u2019t clear to me if yesterday\u2019s Win7 patch, KB 4345459, fixes the problem \u2014 but if it does, the KB article doesn\u2019t bother to mention the fix.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s not all. There are five new .NET patches, falling into these groups:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the KB articles, both of these patches continue to exhibit this \u201cknown issue\u201d:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Users receive a &#8220;0x80092004&#8221; error when they try to install the July 2018 Security and Quality Rollup update KB4340557 or KB4340558 on Windows 8.1, Windows Server 2012 R2, or Windows Server 2012 after they install the June 2018 .NET Framework Preview of Quality Rollup updates KB4291497 or KB4291495 on systems that are running on .NET Framework 4.7.2, 4.7.1, 4.7, 4.62, 4.6.1, or 4.6.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As Martin Brinkmann <\/span><a href=\"https:\/\/www.ghacks.net\/2018\/07\/17\/microsoft-fixes-july-2018-updates-for-windows-7-windows-8-1-and-server\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">explains on his Ghacks site<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is possible that Microsoft did not update the description yet and that the issue is resolved. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">To answer the most obvious question, no, it doesn\u2019t appear as if anyone tests these things before they\u2019re shoved out the Windows Update chute.<\/span><\/p>\n<p><em><span style=\"font-weight: 400;\">Thx to @abbodi86, @PKCano, @gborn, @ghacks and the legions of AskWoody sleuths.<\/span><\/em><\/p>\n<p><i><span style=\"font-weight: 400;\">You can comment on this article on the <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2018\/microsoft-just-released-27-new-security-patches\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">, but be forewarned: I goofed and let the SSL certificate expire Saturday night. You\u2019ll have to <\/span><\/i><a href=\"https:\/\/twitter.com\/woodyleonhard\/status\/1018824773466501121\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">poke through<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> your browser\u2019s defenses to get into the site. Hope to have it working again later today.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3290465\/microsoft-windows\/stung-by-a-festering-pile-of-bugs-on-patch-tuesday-ms-releases-27-more-patches.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Tue, 17 Jul 2018 09:21:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">In what is becoming a common occurrence, Microsoft\u2019s Patch Tuesday brought along so many bugs that they necessitated a remediation round. This month, unusually, it took only six days to get the exterminators out. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since these fixes are aimed at four specific bugs introduced on Patch Tuesday, they don\u2019t include the massive patches normally appearing on the second Patch Whateverday of the month. My guess is we\u2019ll see at least one more big set of Windows patches before the month is out. Oh, boy.<\/span><\/p>\n<h2>Windows July patches, version 2<\/h2>\n<p><span style=\"font-weight: 400;\">Yesterday, Monday, July 16, Microsoft released 27 new security patches for Windows, bringing the total number of <\/span><a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=2018-07\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">patches so far this month<\/span><\/a><span style=\"font-weight: 400;\"> up to 156. The new patches fall into six separate groups:<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3290465\/microsoft-windows\/stung-by-a-festering-pile-of-bugs-on-patch-tuesday-ms-releases-27-more-patches.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10525],"class_list":["post-12831","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12831"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12831\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12831"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}