This security update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:
- Provides protections against an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639) for AMD-based computers. These protections aren't enabled by default. For Windows Server guidance, follow the instructions in KB4072698. Use this guidance document to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).
-
Addresses an issue that affects PowerShell remoting loop back using non-administrator accounts. For more details, see Windows Security change affecting PowerShell.
- Addresses an issue that prevents cross-era navigation in the Japanese Calendar view. For more information, see KB4469068.
- Addresses an issue related to the date format for the Japanese Era calendar. For more information, see KB4469068.
- Addresses an issue that causes the GetCalendarInfo function to return a wrong value for the Japanese Era. For more information, see KB4469068.
- Security updates to Windows App Platform and Frameworks, Windows MSXML, Windows Kernel, Windows Storage and Filesystems, Windows Wireless Networking, and the Microsoft JET Database Engine.
For more information about the resolved security vulnerabilities, please refer to the Security Update Guide.