Aggiornamento cumulativo giugno 2017 - Windows 7 e Windows 8.1

Eseguendo un’installazione pulita di Windows 7 o Windows 8.1, vi aspetterebbero centinaia di aggiornamenti da installare. Per questo motivo, a partire da ottobre 2016 Microsoft ha deciso di rilasciare ogni mese un nuovo aggiornamento cumulativo per Windows 7 SP1 e Windows 8.1.

NOTA | Nel caso in cui non riusciste a effettuare il download e l’installazione degli aggiornamenti cumulativi, potreste trovare utile quest’altra guida.

Aggiornamento cumulativo di luglio 2018

Per Windows 7, Microsoft ha rilasciato l’aggiornamento KB4338818 con il seguente changelog:

  • Provides protections for an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore (CVE-2018-3665) for 64-Bit (x64) versions of Windows.
  • Updates Internet Explorer’s Inspect Element feature to conform to the policy that disables the launch of Developer Tools.
  • Addresses an issue where DNS requests disregard proxy configurations in Internet Explorer and Microsoft Edge.
  • Security updates to Internet Explorer, Windows apps, Windows graphics, Windows Shell, Windows datacenter networking, Windows wireless networking, and Windows virtualization.

Per Windows 8.1, Microsoft ha rilasciato l’aggiornamento KB4338815 con il seguente changelog:

  • Provides protections from an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639). These protections aren’t enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. For Windows Server guidance, follow the instructions in KB4072698. Use this guidance document to enable mitigations for Speculative Store Bypass (CVE-2018-3639) in addition to the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).
  • Provides support to control usage of Indirect Branch Prediction Barrier (IBPB) on some AMD processors (CPUs) for mitigating CVE-2017-5715, Spectre Variant 2 when switching from user context to kernel context. (See AMD Architecture Guidelines for Indirect Branch Control and AMD Security Updates for more details). For Windows client (IT pro) guidance, follow the instructions in KB4073119. Use this guidance document to enable IBPB on some AMD processors (CPUs) for mitigating Spectre Variant 2 when switching from user context to kernel context.
  • Provides protections for an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore (CVE-2018-3665) for 64-Bit (x64) versions of Windows.
  • Updates Internet Explorer’s Inspect Element feature to conform to the policy that disables the launch of Developer Tools.
  • Addresses an issue where DNS requests disregard proxy configurations in Internet Explorer and Microsoft Edge.
  • Addresses an issue that causes the mouse to stop working after a user switches between local and remote sessions.
  • Security updates to Internet Explorer, Windows apps, Windows graphics, Windows Shell, Windows datacenter networking, Windows virtualization, and Windows kernel.

Avete già installato l’update cumulativo? Avete riscontrato dei problemi? Fatecelo sapere nei commenti.

Articolo di Windows Blog Italia