{"id":12864,"date":"2018-07-20T08:30:02","date_gmt":"2018-07-20T16:30:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/07\/20\/news-6631\/"},"modified":"2018-07-20T08:30:02","modified_gmt":"2018-07-20T16:30:02","slug":"news-6631","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/07\/20\/news-6631\/","title":{"rendered":"Microsoft dives down a bizarre non-cumulative rabbit hole with July patches"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security-100734734-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Fri, 20 Jul 2018 09:02:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re trying to apply this month\u2019s patches \u2014 an exercise in futility that I continue to discourage \u2014 you may have found that this month\u2019s patches and their documentation read like a da Vinci script, mirrored upside down and backwards. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Take this astounding bit of bafflegab, from the <\/span><a href=\"https:\/\/blogs.technet.microsoft.com\/exchange\/2018\/07\/16\/issue-with-july-updates-for-windows-on-an-exchange-server\/#comment-343505\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">official Microsoft Exchange blog<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For operating systems prior to Windows 2016, the update will be applied as an additional update to the updates released on July 10th. This means you must apply the July 10th update and then may need to execute Windows Update again to receive the additional update to fully resolve the issue. &#8230;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the Windows Servicing team, for the non Windows Server 2016 operating systems, it is required that the update released on July 10th be installed for Windows update to offer the new update. [This] is because the update is a patch to the previous package. Windows update chooses updates based upon packages previously installed on these operating systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Which is quite a kick in the teeth for the cumulative updating concept \u2014 you know, the idea that you can install the latest patch and all previous patches get rolled in. As Michel de Rooij notes in the same thread, quite correctly:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">KB4338831&#8230; reads, \u201cThis non-security update includes improvements and fixes that were a part KB4338815 (released July 10, 2018) and also includes these new quality improvements as a preview of the next Monthly Rollup update..\u201d, implying it is a replacement like the KB4345418 for WS2016. It seems that for older OS\u2019es there is an update (for the related security update) and a replacement (for the July update).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So we have a case where, at least on the face of it, a \u201ccumulative\u201d update (advancing the build number) requires a previous cumulative update. Otherwise the newer update won&#8217;t install. Which makes no sense at all, to my admittedly Dummy mind.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">@abbodi86 <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/microsoft-just-released-27-new-security-patches\/#post-204691\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">points to<\/span><\/a><span style=\"font-weight: 400;\"> a <\/span><a href=\"https:\/\/translate.google.com\/translate?hl=en&amp;sl=ja&amp;u=https:\/\/blogs.technet.microsoft.com\/jpntsblog\/2018\/07\/19\/stoperror_after_julyupdate\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">post in Japanese<\/span><\/a><span style=\"font-weight: 400;\"> by a Microsoft employee that may (or may not) provide some clarity:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Please apply the update with the (0xD1 Stop error) problem fixed based on the following list.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you are experiencing a problematic update, please apply the update that fixes the problem ( even if you apply the problematic update at the same time ) .<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you have applied the problematic update, please apply additional updates that fix the problem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There follows a list of \u201cProblematic updates\u201d and \u201cPatches that fix the problem\u201d for every version of Windows and Windows Server. For example, the patch that installs Win10 1803 build 17134.165 causes the problem, but build 17134.166 fixes the problem. Which is all hunky-dory, except the <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3290465\/microsoft-windows\/stung-by-a-festering-pile-of-bugs-on-patch-tuesday-ms-releases-27-more-patches.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">latest build is 17134.167<\/span><\/a><span style=\"font-weight: 400;\">, even though the docs referred to 17134.166 when the patch was first released.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Upside down and backwards.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can also, uh, plainly see that if you want to fix the 0xD1 bug in Win7, you need to either install the July Monthly Rollup KB 4338819 followed by the manual-install-only KB 4345459, or you need to jump to next month\u2019s Monthly Rollup Preview, KB 4338821. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow that? OK, now try this. Microsoft has updated its Security Advisory ADV 180016 (and other Security Advisories) to say:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To address a known issue in the security updates released on July 10, Microsoft is releasing Alternate Cumulative update packages for Windows 10, and Standalone and Preview Rollup packages for all other supported editions of Windows. These packages are available via Microsoft Update catalog, WSUS, or by manually searching Windows Update. Customers who are experiencing issues after installing the July Windows security updates should install the replacement packages as applicable. Please refer to the Affected Products table for the replacement package KB numbers. Customers who have successfully installed the security updates and who are not experiencing any issues do not need to take any action.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you can slice through that Gordian knot in plain English (or Japanese), I\u2019m all ears.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bottom line: <strong>Don\u2019t patch.<\/strong> There are no major exploits in the wild that take advantage of holes plugged in July. Sit back and wait for the cavalry to swoop in. Or come back from vacation.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Are you as tired of this Northern hemisphere summertime offal as I am? Join us on the <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2018\/july-patches-are-all-messed-up-but-a-good-hint-appears-in-japanese\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> which, I\u2019m happy to say, no longer throws security alerts.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3290948\/microsoft-windows\/microsoft-dives-down-a-bizarre-non-cumulative-rabbit-hole-with-july-patches.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security-100734734-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Fri, 20 Jul 2018 09:02:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">If you\u2019re trying to apply this month\u2019s patches \u2014 an exercise in futility that I continue to discourage \u2014 you may have found that this month\u2019s patches and their documentation read like a da Vinci script, mirrored upside down and backwards. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Take this astounding bit of bafflegab, from the <\/span><a href=\"https:\/\/blogs.technet.microsoft.com\/exchange\/2018\/07\/16\/issue-with-july-updates-for-windows-on-an-exchange-server\/#comment-343505\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">official Microsoft Exchange blog<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3290948\/microsoft-windows\/microsoft-dives-down-a-bizarre-non-cumulative-rabbit-hole-with-july-patches.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10525],"class_list":["post-12864","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12864"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12864\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12864"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}