Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

January 19, 2018—KB4057400 (Preview of Monthly Rollup)


View products that this article applies to.

Improvements and fixes

This non-security update includes improvements and fixes that were a part of KB4056894 (released January 4, 2018) and also includes these new quality improvements as a preview of the next Monthly Rollup update:

  • Addresses issue where every smart card logon to a Windows Terminal Server/Remote Desktop Server may result in a handle leak in the certprop service. Token leaks result in session leaks on computers that have installed MS16-111/KB3175024 and superseding fixes.

  • Adds support for the SHA2 server’s authentication endpoint support for the Windows Server Update Services server.

For more information about the resolved security vulnerabilities, see the Security Update Guide.

↑ Back to the top


Notes

Important Please apply KB4100480 immediately after applying this update. KB4100480 resolves an elevation of privilege vulnerability in the Windows Kernel for the 64-Bit (x64) version of Windows. This vulnerability is documented in CVE-2018-1038.

↑ Back to the top


Known issues in this update

Symptom Workaround
Because of an issue that affects some versions of antivirus software, this fix applies only to computers on which the antivirus ISV updated the ALLOW REGKEY.

The issue is resolved in KB4093113. You no longer need the following ALLOW REGKEY to detect and be offered this update: 

HKEY_LOCAL_MACHINE"Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat\cadca5fe-87d3-4b96-b7fb-a231484277cc

 

 

The LSM.EXE process and applications that call SCardEstablishContext or SCardReleaseContext may experience a handle leak. Once the leaked handle count reaches a certain threshold, smart card-based operations fail with error "SCARD_E_NO_SERVICE". Confirm the scenario match by reviewing the handle counts for LSM.EXE and the calling processes in the process tab of Task Manager or an equivalent application. 

This issue is resolved in KB4091290.

After installing KB4056897 or any other recent monthly updates, SMB servers may experience a memory leak for some scenarios. This occurs when the requested path traverses a symbolic link, mount point, or directory junction and the registry key is set to 1:  

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\LanManServer\Parameters\EnableEcp

This issue is resolved in KB4103718.

 

↑ Back to the top


How to get this update

This is provided as an Optional update on Windows Update. For more information about how to run Windows Update, see How to get an update through Windows Update. To get the standalone package for this update, go to the Microsoft Update Catalog website.

File information

For a list of the files that are provided in this update, download the file information for update 4057400.

↑ Back to the top


Keywords: Windows Server 2008 R2 Service Pack 1, windows 7 service pack 1

↑ Back to the top

Article Info
Article ID : 4057400
Revision : 46
Created on : 5/7/2018
Published on : 5/8/2018
Exists online : False
Views : 528

Minor Releases