banner



August 'Patch Tuesday' updates now rolling out

It's the second Tuesday of August, which means information technology'due south fourth dimension for another batch of "Patch Tuesday" updates from Microsoft. Every bit with previous Patch Tuesday releases, these cumulative updates don't incorporate any new features. Rather, you'll find a slew of fixes on lath for supported versions of Windows.

If y'all're on Microsoft'south latest Windows 10 release, the April 2022 Update, you lot'll find today'southward fixes in KB4343909 (build 17134.228). This release as well packs updates for Microsoft HoloLens. Hither's a look at what'due south new:

  • Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel® Core® processors and Intel® Xeon® processors (CVE-2018-3620 and CVE-2018-3646). Brand sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the Windows Customer and Windows Server guidance KB articles. (These registry settings are enabled by default for Windows Customer OS editions, but disabled by default for Windows Server Os editions.)
  • Addresses an effect that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This consequence occurs after installing the June 2022 or July 2022 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant two (CVE-2017-5715 – Branch Target Injection).
  • Addresses an issue that prevents apps from receiving mesh updates after resuming. This issue occurs for apps that utilise Spatial Mapping mesh data and participate in the Sleep or Resume bicycle. Ensures that Internet Explorer and Microsoft Edge support the preload="none" tag.
  • Addresses an issue that prevents some applications running on HoloLens, such equally Remote Aid, from authenticating after upgrading from Windows x, version 1607, to Windows ten, version 1803.
  • Addresses an event that significantly reduced battery life subsequently upgrading to Windows x, version 1803. Addresses an result that causes Device Guard to block some ieframe.dll class IDs after installing the May 2022 Cumulative Update. Addresses a vulnerability related to the Export-Modulemember() part when used with a wildcard (*) and a dot-sourcing script. Later on installing this update, existing modules on devices that have Device Guard enabled volition intentionally fail. The exception error is "This module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement." For more than information, see https://portal.msrc.microsoft.com/en-United states/security-guidance/advisory/CVE-2018-8200 and https://www.windowscentral.com/e?link=https%3A%2F%2Fclick.linksynergy.com%2Fdeeplink%3Fid%3DkXQk6%252AivFEQ%26mid%3D24542%26u1%3DUUwpUdUnU57966%26murl%3Dhttps%253A%252F%252Fwww.microsoft.com%252Fen-us%252F%253Fref%253Daka&token=RPOeV2k0

If you're still running a PC on the Fall Creators Update, y'all'll detect a similarly brusque set of fixes with KB4343897 (build 16299.611). Here's a wait:

  • Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel® Core® processors and Intel® Xeon® processors (CVE-2018-3620 and CVE-2018-3646). Make certain previous OS protections against Spectre Variant two and Meltdown vulnerabilities are enabled using the registry settings outlined in the Windows Client and Windows Server guidance KB articles. (These registry settings are enabled by default for Windows Customer OS editions, but disabled past default for Windows Server OS editions.)
  • Addresses an upshot that causes high CPU usage that results in performance degradation on some systems with Family unit 15h and 16h AMD processors. This effect occurs afterward installing the June 2022 or July 2022 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 (CVE-2017-5715 – Branch Target Injection).
  • Updates support for the typhoon version of the Token Bounden protocol v0.16.
  • Addresses an issue that causes Device Baby-sit to block some ieframe.dll class IDs after the May 2022 Cumulative Update is installed.
  • Ensures that Internet Explorer and Microsoft Edge back up the preload="none" tag.
  • Addresses an result that displays "AzureAD" as the default domain on the sign-in screen after installing the July 24, 2022 update on a Hybrid Azure Advert-joined machine. As a consequence, users may neglect to sign in in Hybrid Azure AD-joined scenarios when users provide only their username and countersign.
  • Addresses an issue that adds additional spaces to content that's copied from Internet Explorer to other apps.
  • Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) and a dot-sourcing script. Later on installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is "This module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under awarding verification enforcement". For more than information, see https://portal.msrc.microsoft.com/en-United states/security-guidance/informational/CVE-2018-8200 and https://www.windowscentral.com/eastward?link=https%3A%2F%2Fclick.linksynergy.com%2Fdeeplink%3Fid%3DkXQk6%252AivFEQ%26mid%3D24542%26u1%3DUUwpUdUnU57966%26murl%3Dhttps%253A%252F%252Fwww.microsoft.com%252Fen-us%252F%253Fref%253Daka&token=RPOeV2k0
  • Security updates to Windows Server.

A like set of updates are also rolling out across older versions of Windows 10, including for PCs on the Creators Update and Anniversary Update. If you're fix to get your hands on these fixes, y'all tin can grab the latest updates at present via Windows Update.

Nosotros may earn a committee for purchases using our links. Learn more.

Source: https://www.windowscentral.com/august-patch-tuesday-updates-now-rolling-out

Posted by: hardyaphism1953.blogspot.com

0 Response to "August 'Patch Tuesday' updates now rolling out"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel