Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

July 10, 2018—KB4338815 (Monthly Rollup)


View products that this article applies to.

Improvements and fixes

This security update includes improvements and fixes that were a part of update KB4284863 (released June 21, 2018) and addresses the following issues:

  • Provides protections from an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639). These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. For Windows Server guidance, follow the instructions in KB4072698. Use this guidance document to enable mitigations for Speculative Store Bypass (CVE-2018-3639) in addition to the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).
  • Provides support to control usage of Indirect Branch Prediction Barrier (IBPB) on some AMD processors (CPUs) for mitigating CVE-2017-5715, Spectre Variant 2 when switching from user context to kernel context. (See AMD Architecture Guidelines for Indirect Branch Control and AMD Security Updates for more details). For Windows client (IT pro) guidance, follow the instructions in KB4073119. Use this guidance document to enable IBPB on some AMD processors (CPUs) for mitigating Spectre Variant 2 when switching from user context to kernel context.
  • Provides protections for an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore (CVE-2018-3665) for 64-Bit (x64) versions of Windows.
  • Updates Internet Explorer's Inspect Element feature to conform to the policy that disables the launch of Developer Tools.
  • Addresses an issue where DNS requests disregard proxy configurations in Internet Explorer and Microsoft Edge.
  • Addresses an issue that causes the mouse to stop working after a user switches between local and remote sessions.
  • Security updates to Internet Explorer, Windows apps, Windows graphics, Windows Shell, Windows datacenter networking, Windows virtualization, and Windows kernel.

For more information about the resolved security vulnerabilities, see the Security Update Guide.

↑ Back to the top


Known issues in this update

Symptom Workaround
After installing this update, some devices running network monitoring workloads may receive the 0xD1 Stop error because of a race condition.

This issue is resolved in KB4338831.

Restarting the SQL Server service may fail occasionally with the error, “Tcp port is already in use”.

This issue is resolved in KB4338831.

When an administrator tries to stop the World Wide Web Publishing Service (W3SVC), the W3SVC remains in a "stopping" state, but cannot fully stop or be restarted.

This issue is resolved in KB4338831.

 

↑ Back to the top


How to get this update

This update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the Microsoft Update Catalog website.

File information

For a list of the files that are provided in this update, download the file information for update 4338815

↑ Back to the top


Keywords: windows server 2012 r2, windows 8.1

↑ Back to the top

Article Info
Article ID : 4338815
Revision : 34
Created on : 3/11/2019
Published on : 3/11/2019
Exists online : False
Views : 592

Minor Releases