{"id":12875,"date":"2018-07-23T04:30:08","date_gmt":"2018-07-23T12:30:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/07\/23\/news-6642\/"},"modified":"2018-07-23T04:30:08","modified_gmt":"2018-07-23T12:30:08","slug":"news-6642","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/07\/23\/news-6642\/","title":{"rendered":"July Windows .Net patches appear, disappear, reappear, disappear again"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security-100734734-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Mon, 23 Jul 2018 05:15:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft&#8217;s July 2018 series of patching missteps, with .Net security patches in particular, have left many admins in the lurch. Less than two weeks after they were first unleashed, poorly documented versions of the patches now appear to be available, but are not being actively pushed. There\u2019s no indication from Microsoft if and\/or when they\u2019ll be fixed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These patches, originally released on Patch Tuesday, July 10, are baring their FAANGs:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The patches had been out for less than a day when we started seeing error reports on AskWoody. As I <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3289506\/microsoft-windows\/patch-tuesday-problems-abound-server-2016-crashes-and-a-net-patch-goes-down-in-flames.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">noted on July 12<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you tried to install KB 4340558, the \u201cSecurity and Quality Rollup updates for .Net Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 for Windows 8.1, RT 8.1, and Server 2012 R2\u201d and had it crash with an error 0x80092004, you aren\u2019t alone. AskWoody poster<\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/july-2018-security-patches-are-out\/#post-202787\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">macauln82 says<\/span><\/a><span style=\"font-weight: 400;\"> he\u2019s seen it happen on all of his Server 2012 R2 machines. G\u00fcnter Born has a<\/span><a href=\"https:\/\/borncity.com\/win\/2018\/07\/11\/net-framework-update-kb4340558-drops-error-0x80092004\/\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">detailed explanation<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">On July 13, in damage control mode, Microsoft <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4345232\/0x80092004-error-and-updates-kb4340557-and-kb4340558-don-t-install-aft\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">posted article KB 4345232<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">&#8220;0x80092004&#8221; error occurs and July 2018 .NET Security and Quality Rollup update KB4340557 or KB4340558 does not install after you apply June update KB4291497 or KB4291495<\/span><\/i><span style=\"font-weight: 400;\">. The original version of that article listed two manual workarounds, neither of which worked in all cases.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft modified the patches (it\u2019s not clear exactly how), and reposted them on the Update Catalog dated July 16.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Then, on July 19, they were reposted again. If Microsoft changed the KB article to reflect the new-new versions, I can\u2019t find the modification. But the KB 4345232 article was updated on July 19 to say:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has re-released the July 2018 .NET Framework Security and Quality Rollup updates, KB 4340558 and KB 4340557 to correct an installation issue. You can scan for these updates through Windows Update. You can also download and install these updates directly through the following Knowledge Base articles &#8230;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As if that weren\u2019t enough, the patches were updated again, and now appear in the Update Catalog marked July 20. Again, there\u2019s no indication what was changed or why, but the original KB articles now say they were updated on July 20.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"https:\/\/www.askwoody.com\/2018\/patch-lady-results-of-the-consultant-patcher-survey\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Susan Bradley<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For the record the .NET updates have not be officially \u201cpulled\u201d but they are unchecked and not being pushed via Microsoft update. If you use WSUS to patch you may want to pull back on approval<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I\u2019ve seen multiple reports of the patches not appearing in the WSUS list.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That leaves us with a handful of .Net patches that have gone through at least four revisions \u2014 most of which are completely undocumented \u2014 in the past two weeks. Who\u2019s testing this stuff? <\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Stuck in a .Rut? Join us on the<\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2018\/four-sets-of-net-security-patches-in-the-past-two-weeks\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\"> AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3291786\/microsoft-windows\/july-windows-net-patches-appear-disappear-reappear-disappear-again.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security-100734734-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Mon, 23 Jul 2018 05:15:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Microsoft&#8217;s July 2018 series of patching missteps, with .Net security patches in particular, have left many admins in the lurch. Less than two weeks after they were first unleashed, poorly documented versions of the patches now appear to be available, but are not being actively pushed. There\u2019s no indication from Microsoft if and\/or when they\u2019ll be fixed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These patches, originally released on Patch Tuesday, July 10, are baring their FAANGs:<\/span><\/p>\n<ul>\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4340556\/security-and-quality-rollup-updates-for-net-framework-3-5-1-4-5-2-4-6\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4340556<\/span><\/a><span style=\"font-weight: 400;\">\u00a0\u2014 Security and Quality Rollup updates for .Net Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 and 4.7.2 for <\/span><strong>Windows 7 <\/strong><span style=\"font-weight: 400;\">SP1 and <\/span><strong>Server 2008 R2 <\/strong><span style=\"font-weight: 400;\">SP1 <\/span><\/li>\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4340557\/security-and-quality-rollup-updates-for-net-framework-3-5-sp1-4-5-2-4\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4340557<\/span><\/a><span style=\"font-weight: 400;\">\u00a0\u2014 Security and Quality Rollup updates for .Net Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows <\/span><strong>Server 2012<\/strong><\/li>\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4340558\/security-and-quality-rollup-updates-for-net-framework-3-5-sp1-4-5-2-4\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4340558 \u2014<\/span><\/a><span style=\"font-weight: 400;\">\u00a0Security and Quality Rollup updates for .Net Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for <\/span><strong>Windows 8.1<\/strong><span style=\"font-weight: 400;\">, <\/span><strong>RT <\/strong><span style=\"font-weight: 400;\">8.1, and <\/span><strong>Server 2012 R2<\/strong><\/li>\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4340559\/security-and-quality-rollup-updates-for-net-framework-2-0-sp2-3-0-sp2\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4340559<\/span><\/a><span style=\"font-weight: 400;\">\u00a0\u2014 Security and Quality Rollup updates for .Net Framework 2.0 SP2, 3.0 SP2, 4.5.2, and 4.6 for Windows <\/span><strong>Server 2008<\/strong><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The patches had been out for less than a day when we started seeing error reports on AskWoody. As I <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3289506\/microsoft-windows\/patch-tuesday-problems-abound-server-2016-crashes-and-a-net-patch-goes-down-in-flames.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">noted on July 12<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3291786\/microsoft-windows\/july-windows-net-patches-appear-disappear-reappear-disappear-again.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10525],"class_list":["post-12875","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12875"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12875\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}