• Microsoft Patch Alert: Suddenly, Windows 7 patching is an unholy mess

    Home » Forums » Newsletter and Homepage topics » Microsoft Patch Alert: Suddenly, Windows 7 patching is an unholy mess

    Author
    Topic
    #178685

    With the publication yesterday of Ulf Frisk’s “Total Meltdown” vulnerability, patching this month has turned into a damned-if-you-do/damned-if-you-don
    [See the full post at: Microsoft Patch Alert: Suddenly, Windows 7 patching is an unholy mess]

    NOTE: I’ve merged two other AskWoody threads on “Total Meltdown” into this thread…

    Viewing 42 reply threads
    Author
    Replies
    • #178635

      It seems, something went terribly wrong: January/February 2018 Meltdown patches from Microsoft opens even a bigger hole. No more exploit is necessary to access the memory from user processes (and even write it).

      See Windows 7 Jan./Feb. 2018 patches opens Total Meltdown vulnerability

      Ex Microsoft Windows (Insider) MVP, Microsoft Answers Community Moderator, Blogger, Book author

      https://www.borncity.com/win/

      8 users thanked author for this post.
    • #178688

      They blatantly and obviously have taken all the decent patching engineers and put them at Win10 desks… it just gets worse and worse every month for everyone not on 10. And unfortunately it will most likely only get worse, because there is no recourse. They’re fulfilling their end of the deal, supporting 7 in extended support, “pray I don’t alter it further.” Imagine if GWX 2.0 came out now… people would be even more fubbernucked if they wanted to stay on 7.

      5 users thanked author for this post.
      • #178736

        I haven’t seen any evidence that Windows 10 is any better. It has more vulnerabilities than the other Windows versions each month, and its updates are no more reliable. If anything, the forced new version every six months makes Windows 10 even more problematic.

        We seem to me to be on course for welcoming the end of life support for Windows 7 with a sigh of relief. Those who argue that there are better ways of protecting your system than Microsoft’s monthly updates may yet be proved to have a point!

        7 users thanked author for this post.
        • #178762

          My knee jerk reaction is to say that there are some things I like in Win10 that were not present in other versions, but then if I really think about it, quite a lot of those things were in 8 and 8.1 but my experience with both of those is minimal at best. (I have more experience with Server 2012 / 2012 R2, TBH with you.)

          10 seems more speedy than 7 on the same hardware, but then again, I would imagine 8.1 probably would just the same.

          I think the thing keeping me running 10 at this point after 1703 grew on me is the fact that doing a wipe and clean install on all my machines at home will take up quite a chunk of my time that I’d rather devote to other things in life. But, I will say that the minute any one of those machines starts acting up, it will be wiped and clean installed (probably with 8.1, I suppose). I would say I’d go back to 7, but at this point I don’t know.

      • #178766

        More likely they fired all the good engineers to save money.   Since 10 patching is as bad as 7.

      • #178844

        it just gets worse and worse every month for everyone not on 10

        Well, not really. Month to month 8.1 has least vulnerabilities and there are no issues with the patches. I just recall being unable to log to MS account a few months ago. It (W8.1) just keeps doing its job and is maintenance free.

        Fractal Design Pop Air * Thermaltake Toughpower GF3 750W * ASUS TUF GAMING B560M-PLUS * Intel Core i9-11900K * 4 x 8 GB G.Skill Aegis DDR4 3600 MHz CL16 * ASRock RX 6800 XT Phantom Gaming 16GB OC * XPG GAMMIX S70 BLADE 1TB * SanDisk Ultra 3D 1TB * Samsung EVO 840 250GB * DVD RW Lite-ON iHAS 124 * Windows 10 Pro 22H2 64-bit Insider * Windows 11 Pro Beta Insider
        4 users thanked author for this post.
    • #178695

      I had a “Eureka!” moment a few hours ago that ties together various seemingly unrelated aspects, and testing has confirmed it! 😀 In order for Windows 7 users (or at least Windows 7 x64 users) to see the March 2018 Windows monthly rollup in Windows Update, you need to do prerequisites first. Here is one set of prerequisites that works: 1) Install the Feb. 2018 Windows monthly rollup, and 2) Hide the Feb. 2018 preview Windows monthly rollup, and 3) Set the QualityCompat registry item (discussed previously). There may be others sets of prerequisites that work also.

      Here are the various seemingly unrelated aspects that I have discovered to be related:

      1. Why the March 2018 Windows monthly rollup isn’t listed in Windows Update for some users.

      2. The unusual supersedence behavior of KB4091290 that I observed.

      3. The unusual value of the update attribute supersedenceBehavior used for the updates mentioned in points #1 and #2.

      4. Why did Microsoft do the things mentioned above? I believe it’s quite likely related to the Total Meltdown vulnerability mentioned in topics https://www.askwoody.com/forums/topic/january-patches-opens-total-meltdown-hole/ and https://www.askwoody.com/forums/topic/microsoft-patch-alert-suddenly-windows-7-patching-is-an-unholy-mess/. I believe that Microsoft did this to try to make it harder for reverse engineers to discover the Total Meltdown vulnerability that Microsoft quietly fixed in the Windows 7 x64 March 2018 Windows monthly rollup.

      This is the first known instance (to me anyway) of the need to hide an Optional update in order to see a non-Optional update in Windows Update in Window 7.

      My previous hypothesis that Microsoft is blacklisting the March 2018 Windows monthly rollup in Windows Update for some computers known to have trouble with it seems to have been disproven.

      Whew!!!!!!!!!!!

      13 users thanked author for this post.
      • #178697

        I would like to credit this abbodi86 post and this post (specifically the sentence “Windows 7 and Server 2008 R2 users should make sure they installed both the January 2018 and March 2018 Patch Tuesday releases.”), without which I may not have had the “Eureka!” moment.

        3 users thanked author for this post.
      • #178704

        Given point #2, I would not be surprised if Microsoft first fixed Total Meltdown in KB4091290.

        3 users thanked author for this post.
      • #178705

        If you’re using Windows Update and want to hide the Feb. 2018 preview Windows monthly rollup, you’ll need to do these first:

        1. Hide the March 2018 preview Windows monthly rollup.

        2. Check for updates again.

        1 user thanked author for this post.
        • #178752

          Ok, so I saw KB4088875 offered to me by WU for a couple of days after the 13th but then by Saturday the 17th it was gone from WU, leaving me being offered MSRT and Office patches.

          Fast forward to a few minutes ago. I had been offered KB4088881, the March preview for April as an optional update. I hid that and reran WU. Was then offered the Feb preview for March, and subsequently hid that. Was then offered KB4088875 and KB4091290, both unchecked. I had never been offered KB4091290 before, and have installed BOTH January’s and February’s rollups when Woody has raised the MS-DEFCON level to 3 or higher for that given month’s patches.

          After unhiding the March preview for April (KB4088881), I’m still being offered 4088875 and 4091290 (both unchecked by default) along with the March preview for April, KB4088881! Go figure. Since I don’t have a smart card reader installed on either of my machines, I plan to hide KB4091290.

          I also believe that KB4088881 probably does have the fix that MS quietly incorporated into KB4088875, the March patch. Therefore, for now, I plan to wait until we get the green light to install April’s wave of patches unless we hear of extenuating circumstances that would make patching with March’s rollup more prudent than playing the waiting game.

          2 users thanked author for this post.
      • #178706

        I can confirm your observations.
        On one of my VMs on which the March Rollup did NOT appear at all, I hid the 3-18 Preview and the 2-18 Preview.

        On searching for updates, both KB 4091290 and KB 4088875 appeared in WU UNCHECKED.

        5 users thanked author for this post.
        • #178711

          Thank you for confirming :).

          • #178713

            Precisely. What are the current directions for patching Windows 7 successfully?

            On permanent hiatus {with backup and coffee}
            offline▸ Win10Pro 2004.19041.572 x64 i3-3220 RAM8GB HDD Firefox83.0b3 WindowsDefender
            offline▸ Acer TravelMate P215-52 RAM8GB Win11Pro 22H2.22621.1265 x64 i5-10210U SSD Firefox106.0 MicrosoftDefender
            online▸ Win11Pro 22H2.22621.1992 x64 i5-9400 RAM16GB HDD Firefox116.0b3 MicrosoftDefender
            • #178764

              The current directions @geekdom are to do nothing. Zilch. Zero. We’re at DefCon 2 rating, which means quite simply sitting tight. There is as yet no recommendation to install the March updates, nor is there any recommendation to uninstall any earlier updates.

              3 users thanked author for this post.
        • #178717

          Yep 875 on mine is unchecked.  If it’s considered important but unchecked what does that mean? I’m just a regular user not a company admin.

          • #178718

            If it’s unchecked it means don’t do anything. WAIT

            3 users thanked author for this post.
          • #178720

            I believe that it’s been unticked by default for everyone for almost 2 weeks already. In this case, it’s probably unticked because of the issues that installing it causes some users.

            3 users thanked author for this post.
      • #178714

        Those who follow my (unofficial) update hiding advice for Windows 7 and Windows 8.1 should see the March 2018 Windows monthly rollup in Windows Update, assuming that you installed the Feb. 2018 Windows monthly rollup, and also set the QualityCompat registry item.

        2 users thanked author for this post.
      • #178759

        @Mr.Brian:  At the time KB407 5211 came out, we hid it.   Now I still have the KB4091290 listed as Optional (as of 3-27-18), and not checked.  Should everyone just wait and see what is going to occur next?   I presently don’t have the time to try to “study” this, however I doubt that I would understand it if I did.    I will just keep trying to read everything that I can find that will hopefully point me in the right direction.   Thank you for all of the hard work you have done on this !!

        • #178774

          If you’re following Woody’s system, then it’s not time to install the March 2018 updates yet.

          1 user thanked author for this post.
      • #178781

        @MrBrian
        You may have found something, but I don’t think that this issue affect users who patch regularly, every month. This has not changed from previous instances.
        It is impossible for Microsoft to test every style of patching in the wild and there is likely a certain degree of complacency when it comes to Windows 7 as only those who don’t want, will not notice. Time to move to Windows 10 Pro or higher if available or non-Microsoft products. Windows 7 is almost dead.
        What may be the case with the current patch is the common throttling which was described very long time ago in a post elsewhere by the Patch Lady and which was explained here by me in the past. This time it is “pseudo-throttling”, in the sense that the implementation is related to further testing rather than server load, very much so like the Office Updates in Week A.
        For consistency, I will mention that there are certain configurations and update sequences which I tested and where the famous KB3021917 behaves in the same way, either checked or not.
        From my point of view, any important patch available should be installed sooner or later, checked or unchecked. The only notable exception for Windows 7 is KB971033 which can be safely hidden. Everything else should be installed, including KB2952664, while turning off the well-documented CEIP, Windows Error Reporting and related Scheduled Tasks.

        1 user thanked author for this post.
        • #178818

          Perhaps the reason that Microsoft used supersedenceBehavior=1 for KB4088875 is related to automatic update behavior indeed. However, there is already an attribute AutoDownload that controls automatic update behavior.

        • #178912

          When i checked Windows 7 updates with powershell script, i noticed that all updates has the same value for AutoSelection/AutoDownload = 0

          except 3 updates: KB4091290 (Feb 2019 preview), KB4088875 (March 2018 Security), KB3021917 (Win10 related)
          those has the values as:
          AutoSelection : 1
          AutoDownload : 2

          1 user thanked author for this post.
        • #179068

          It is impossible for Microsoft to test every style of patching in the wild

          Yes, but they did a lot better job of it before disbanding their testing dept. Also, when they did individual patches rather than one big rollup, you could block one that caused issues. No more; now, it’s either all or none.

          Group "L" (Linux Mint)
          with Windows 10 running in a remote session on my file server
          1 user thanked author for this post.
      • #180353

        @Mr.Brian:  On March 28th,  I have a note that you recommended to “Wait” on the KB4091290, so that is what I did.   It apparently was published on March 1st.    I’m confused, so I would appreciate your current recommendation regarding this update.  Still unchecked, and a March update.   I’m the Win7 x64, Home Prem., Group A, no sophisticated programs.   Understand that until Woody raises the Defcon we are to WAIT, I’m just wondering what is going to occur with this update.

        Thank you for any information you may be able to provide on this one.    I already installed KB4100480 on March 31st, restarted and installed without any problem.  I have not checked to see if KB4091290 is still in the updates.   I will do that now.   Thank you once again for all of the guidance, knowledge, and expertise you provide to us all.     🙂

        There is one (Important) pending update from March, unchecked, and is under the “WAIT” instruction to for update (if it “is” acceptable).   This is the KB4088875 update. It is becoming very, very confusing.  There is only one other March update under “Optional”, unchecked, KB4088881) My apologies for my inability to comprehend what “direction” things are heading for  at the present time.

    • #178696

      It’s been an “unholy mess” since January at least. So, let me get this straight. Those who were frantically scrambling to update their Win7 PC’s against Meltdown have created an even WORSE vulnerability than what was there previously? You can’t make this stuff up.. and people think it’s dangerous to run unpatched? Stuff like this just proves my point and even further solidifies my decision to stop patching permanently. My machine is way more secure without these destructive patches.

      MS is deliberately sabotaging Windows 7 (and 8.1 too perhaps? Does the meltdown patch for 8.1 cause the same vulnerability?) and if they’re not, then they are consistently incompetent on levels never seen before. This is still GWX only now (and for awhile now), it has changed from forcing upgrades to maliciously destroying the OS in an attempt to scare people to upgrade to Windows 10 voluntarily. It’s even more reason to avoid it IMO.

      • #178721

        It’s a shame they continue shooting themselves in the foot over Win10 because it really is a fantastic OS. But the doubts and negativity surrounding it – and their behaviors over the last few years – it’s just not a good environment, and it’s undoubtedly all their own fault. They’re too eager to slurp data and control things that they’re circumventing and ignoring more than 20 years of processes and standards.

        9 users thanked author for this post.
      • #178760

        It worked for me – I got scared into upgrading to Linux.

        8 users thanked author for this post.
      • #178788

        Agreed. 🙁

        Based on MS’ track record, only an idiot would use their IoT stuff:
        https://blogs.microsoft.com/iot/2018…manufacturing/

         

        -lehnerus2000

        1 user thanked author for this post.
      • #178969

        More observations found the other day:

        The Register

        PS: Tried to access the site earlier but could not get in (for obvious reasons)

        If debian is good enough for NASA...
        1 user thanked author for this post.
    • #178743

      That was the last straw. I’ve just removed all updates newer than January 2018 from my small Win 7 system, which was patched to January level Group A style, and lo and behold my max I/O throughput is now back to historically high levels. Thank goodness that uninstalling updates worked. Good riddance to the (now clearly ineffective) mitigations and the associated performance losses. I’ll continue to rely upon my other security layers.

      I never did put those mitigations into my Win 8.1 workstation in the first place, because I could stand the performance hits even less on that system.

      Always ask yourself, “What price security?” and know that nothing can ever be completely secure. It’s always about risk/reward tradeoffs.

      -Noel

      Total of 26 users thanked author for this post. Here are last 20 listed.
      • #178799

        Always ask yourself, “What price security?” and know that nothing can ever be completely secure. It’s always about risk/reward tradeoffs.

        After reading Woody’s article, I’m glad I held off installing the January and February “security” patches on my Windows 7 64-bit system. I know the performance hit will be high. As you say, there are always tradeoffs.

      • #178880

        That was the last straw. I’ve just removed all updates newer than January 2018 from my small Win 7 system, which was patched to January level Group A style, and lo and behold my max I/O throughput is now back to historically high levels. Thank goodness that uninstalling updates worked. Good riddance to the (now clearly ineffective) mitigations and the associated performance losses. I’ll continue to rely upon my other security layers.

        I never did put those mitigations into my Win 8.1 workstation in the first place, because I could stand the performance hits even less on that system.

        Always ask yourself, “What price security?” and know that nothing can ever be completely secure. It’s always about risk/reward tradeoffs.

        -Noel

        What the **** are you doing Microsoft? You know about the Meltdown vulnerability for months and yet you made my Windows 7 systems even more insecure by asking me to install the January and February patches, even though they are supposed to mitigate it? I can’t stop thinking : is this another attempt to make Windows 7 users’ lives miserable so that they might consider moving to Windows 10?

        In light of this new discovery of the “Total Meltdown” vulnerability (and the problems in the March updates which potentially affects me significantly as I am a heavy user of VMware Workstation), which Microsoft introduced into Windows 7 in its misguided attempts to patch the Meltdown vulnerability, I am going to restore the Windows 7 system images which were patched to December 2017 (I had them prepared after knowing about the Meltdown and Spectre vulnerabilities and their possible performance impacts, and it is coming in handy now.), and leave them at that. I am literally stopping to patch my Windows 7 systems now, and if necessary I will stop patching them completely, like what Sessh did.

        I will continue patching my Windows 8.1 systems for now, as they appear to be unaffected by Total Meltdown.

        Hope for the best. Prepare for the worst.

      • #178892

        I’m thinking my mother and father should roll their computers back to the pre-January update state.  All this literally less than one week after they updated.

        Fortran, C++, R, Python, Java, Matlab, HTML, CSS, etc.... coding is fun!
        A weatherman that can code

        1 user thanked author for this post.
        • #178971

          I just done this after reading the article in The Register in our W8.1 system with the exception of the MS Flash updates. Our W7 systems haven’t been anywhere near WU since December.

          If debian is good enough for NASA...
    • #178748

      Hmmm… I don’t know…

      Had a “ah! bite me”-moment a couple of days ago, clicked “Search for updates”, ticked the roll-up and some .net a.o. and clicked “Install now”… some +400 Mb and 10 minutes later rebooted and everything seems fine?

      Shall I test something?

      *hugs the backup*

    • #178749

      I have a question regarding Windows update, does the time zone matters when recieving updates?

      Just someone who don't want Windows to mess with its computer.
      • #178845

        Shouldn’t. I’m offered patches 19:00 local time on Patch Tuesday, which is exactly 10:00 in Redmond.

        Fractal Design Pop Air * Thermaltake Toughpower GF3 750W * ASUS TUF GAMING B560M-PLUS * Intel Core i9-11900K * 4 x 8 GB G.Skill Aegis DDR4 3600 MHz CL16 * ASRock RX 6800 XT Phantom Gaming 16GB OC * XPG GAMMIX S70 BLADE 1TB * SanDisk Ultra 3D 1TB * Samsung EVO 840 250GB * DVD RW Lite-ON iHAS 124 * Windows 10 Pro 22H2 64-bit Insider * Windows 11 Pro Beta Insider
    • #178755

      I just finished reading Woody’s Computerworld article.

      I did download the script from Microsoft’s web page.  Furthermore, I did hide the March and then February previews, so I was able to get KB4088875 to reappear in Windows Update as an unchecked update.

      But that’s as far as I’ve gone. I haven’t run the script or installed the update. So what, if anything, should Windows 7 users be doing about Total Meltdown?

      • #178773
        1 user thanked author for this post.
        • #178778

          Thank you for answering my question.  I can’t say I’m surprised by the answer of “do nothing”.

          Perhaps you know the answer to this one:  “How can Microsoft employees screw up so badly month after month and not lose their jobs?”

          • #178785

            Who says Microsoft thinks they screwed up?

            Gosh, if anything they made Win 7 seem less attractive to people trying to stick with it a little longer. Did a fraction of a percent of the BILLION+ Windows users get fed up THIS time and just buy a new computer?

            If anything, a real screwup would be to make the old operating systems better somehow.

            -Noel

            4 users thanked author for this post.
            • #178801

              Who says Microsoft thinks they screwed up? Gosh, if anything they made Win 7 seem less attractive to people trying to stick with it a little longer. Did a fraction of a percent of the BILLION+ Windows users get fed up THIS time and just buy a new computer? If anything, a real screwup would be to make the old operating systems better somehow. -Noel

              The only people really paying attention to this stuff are the ones who read tech headlines. And they don’t strike me as the type to buy a new Windows computer in a fit of pique.

              And yes, Microsoft must know they screwed up, even though they wish all Windows 7 users would just “upgrade” to Windows 10.

              1 user thanked author for this post.
    • #178756

      This is still only affecting Intel right? I considered uninstalling all 2018 monthly rollups just to be clean of this mess, but since I don’t use any Intel parts would it make any difference?

    • #178763

      So it’s confirmed this is 64-bit only? 32-bit OSs unaffected? Or what about those who used the registry key to disable the Meltdown fix? And any confirmation that the bug was fixed in KB4091290 so one won’t need to jump to the March patch for it?

      The rest of the mess… Not saying it goes over my head because I’d probably see how it all connects if I’d bother, but frankly don’t care enough. Just want my computer to a) keep working well; b) be protected from vulnerabilities; and c) not snoop on me or in general do stuff I don’t want it to. That seems one heck of a tall ask though. Up to some 5 years ago (d**n, it’s been long), b) was largely the one concern, and regarding a) bugs tended to get reduced over time, or at least in my experience patches were overwhelmingly a good thing. Since then though, worse and worse.

      — Cavalary

    • #178771

      Is it recommended to uninstall the Meltdown fixes at this stage then?  This whole mess has me confused.  Group B so I only installed the AMD-centric Meltdown update.

      2 users thanked author for this post.
    • #178776

      I’m looking for some clarity here, I installed the Jan 2018 & Feb 2018 “Rollups” ( win 7 x64 & x86 ) when Woody announced that it was time to get patched. I have stayed away from the March 2018 updates altogether so far.

      After reading Woody’s Computerworld article, should I uninstall Jan & Feb 2018 Rollups??? Any advice appreciated.

      Note: I haven’t noticed any problems with the Rollups but according to what I read in the article, they put a massive hole in your security. Please correct me if I have misread something.

      Don't take yourself so seriously, no one else does 🙂
      All W10 Pro at 22H2,(2 Desktops, 1 Laptop).

      2 users thanked author for this post.
      • #178792

        Ok, my earlier submission got swallowed by a server timeout error, so I’ll try again.

        I’m looking for some clarity here, I installed the Jan 2018 & Feb 2018 “Rollups” ( win 7 x64 & x86 ) when Woody announced that it was time to get patched. I have stayed away from the March 2018 updates altogether so far. After reading Woody’s Computerworld article, should I uninstall Jan & Feb 2018 Rollups??? Any advice appreciated. Note: I haven’t noticed any problems with the Rollups but according to what I read in the article, they put a massive hole in your security. Please correct me if I have misread something.

        The standard advice for now is to sit tight, and don’t install the March patch until Woody gives the go-ahead for it. By the same token, don’t uninstall any patches already installed unless they’re causing visible problems with your computer right now, or unless Woody or one of the highly regarded MVP’s here tell us to do so.

        Although there is the massive hole caused by the January and/or February patch(es) that’s been described, there’s nothing out there yet taking advantage of it. Just like the Meltdown and Spectre holes, nothing currently taking advantage of them.

        So, sit tight for now, but keep checking back here at least once a day to see if there’s a change to the MS-DEFCON level. If there is, you can bet Woody will give us the full details on what to do, patching-wise.

        6 users thanked author for this post.
        • #178796

          Thanks for the advice Bob99. I set WU to “never” long, long ago and only check for updates when an “All Clear” has been announced.

          Don't take yourself so seriously, no one else does 🙂
          All W10 Pro at 22H2,(2 Desktops, 1 Laptop).

          • #178803

            You’re Very Welcome, @CaDesertRat and @Demeter. BTW, I’ve had Windows Update set to “Never Check for Updates” since the days of Windows XP.

            I saw a very good friend’s computer completely bricked by Windows Update when there were about 15 or so updates for it to download and install by itself. He and I left to run some errands, returning about an hour or so later. Upon returning, instead of finding his computer updated after having rebooted after installing all the updates, we found a BSOD greeting us. It took quite a bit (the better part of a whole weekend day) to uninstall the mess and get his machine up and running again with all the patches installed successfully.

            Ever since then, I only install Windows security updates one at a time and reboot after each one of them, whether it needs it or not. Although this takes longer than just clicking all the boxes for the updates in Windows Update and letting it do it’s thing, it’s less of a hassle uninstalling only one update that’s causing problems instead of uninstalling several updates to find which one has caused a problem.

            3 users thanked author for this post.
    • #178772

      As per blog.frizk.net/2018/03/total-meltdown.html, it seems Windows 7 users having the January/February patches installed are in harms way.

      • #178810

        To help avoid duplicate threads, please see the commentary about this  very subject here. Plenty has already been said, but there’s still room for more!

        2 users thanked author for this post.
    • #178791

      While waiting for the magical Defcon to tick over for the March Security Only updates, can I please ask if the IE update to be installed should be the 4089187 or the later 4096040 ????

      ( the  2000003: Ongoing list of “Group B” monthly updates for Win7 is still showing 4089187 )

    • #178793

      Am in the same boat as CADesertRat; did Jan. & Feb. Win 7  x64 Rollups as per Defcon at the time. Have stayed away from any March updates & have “check for updates” set at “never”. What to do now? Sit tight and hold one’s breath? I didn’t know it was possible to uninstall an update. How is that done? I’m determined to stick with Win 7 as long as I can. Win 10 sounds like an even unholier mess.

      EDIT to remove bolding of entire post

      • #178970

        @Demeter: “I didn’t know it was possible to uninstall an update. How is that done?”

        – Click on Start > Control Panel > Windows Update

        – Click on ‘Installed Updates’ in the lower left corner of your screen
        (it may take time, so give your computer some time to show all the updates)

        – At the top of the page you’ll see

        “Uninstall an update
        To uninstall an update, select it from the list and then click Uninstall or Change.”

        – You can also right-click on an update in order to Uninstall it.

        P.S. Please do not comment in ‘bold’ as it makes it difficult to read 🙂

        Win 7 SP1 Home Premium 64-bit; Office 2010; Group B (SaS); Former 'Tech Weenie'
        4 users thanked author for this post.
        • #179339

          Thanks SueW for the straightforward instructions. Seeking advice from those more techie than me, uninstall KB4056894 & KB4074598 or best to just wait it out?

          1 user thanked author for this post.
      • #179357

        Woody hasn’t given the go-ahead to do anything yet. Microsoft is recommending to install KB4100480 “immediately” if you previously installed any of the updates listed at https://support.microsoft.com/en-us/help/4100480/windows-kernel-update-for-cve-2018-1038. I installed KB4100480 last night.

        1 user thanked author for this post.
        • #179702

          @Mr.Brian:  I haven’t seen the KB4100480 update yet, however I will now check and hope that it is there.  Thank you for all of the guidance you have provided on this.  Installing this update appears to be the only way to try to get our computers protected.   Thank you very, very much for your help, as always!

    • #178795

      Thanks Bob99. Missed your new post due to server timeout. Sitting tight as advised.

    • #178802

      …and to add more:
      March 26, 2018 – https://support.microsoft.com/en-us/help/4088878/windows-7-update-kb4088878
      This line “If the version of PCI.SYS file is less than 6.1.7601.21744, please follow the step-by-step instructions outlined below before applying this update to physical or virtual machine:” (install the script) was there,  March 28, 2018 it was gone.
      HUH!

      • #178807

        Microsoft changed the script to check for the version of the pci.sys file so you don’t have to. They probably got too much “confused” feedback from folks who didn’t know just how or where to look on their machines for the file in question.

        The script probably checks the version of pci.sys and, if needed, does its thing. If not needed, it probably exits with a note that it wasn’t needed after all.

    • #178826

      This is about Windows 7 updating.

      The problems caused by installing updates that later prove troublesome can be mitigated, in my opinion, backed by some experience, by using a restore point to restore the system to its state previous to that update. A restore point is either created automatically before starting the installation of a new update with Windows Update, or can be created by the user if installing by hand from the Catalogue (Group B). For that, go to Control Panel/System/System Protection/Create and follow the instructions to create a new restore point.

      Further explanation on how to create and then use a restore point to go back to a previous state of the system, here:

      https://www.howtogeek.com/howto/windows-vista/using-windows-vista-system-restore/

      If the machine actually crashes after the update, but one can boot it in safe mode, then the same procedure can be followed by pressing Start in the simplified desktop that becomes available, then on Control Panel, and going from there in the same way as shown in the Web Page reached with the link above. Then log out and restart the machine.

       

       

      Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

      MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
      Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
      macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

    • #178828

      TotalMeltdown ain’t the half of it. In my opinion, TotalMeltdown is so serious that one is left with only two choices:

      1. Dump the Microsoft January and February Meltdown patches, make sure that you only use web browsers which have been updated to prevent Meltdown, be extremely careful with regards to installing any new software, and use an AV program which alerts you to any new and unknown process which mysteriously shows up and tries to run on your computer. Far from all AV programs have features to automatically block new and unknown processes which try to launch without your approval.

      2. Install the incredibly flawed March update (rollup or security only) in order to resolve the TotalMeltdown issue which was created by inept Microsoft programming.

      I have been following various online forums in which experts about CPU design reiterate that Meltdown and Spectre are just the tip of the iceberg in terms of various specific types of vulnerabilities and attack methods which will be discovered in years to come and which are related to the branch predictor, speculative execution, and side-channel vulnerabilities. None of them are discussing what new types of vulnerabilities and exploit methods will be found in the next few to several years, yet all of them are saying that “this is as bad as it gets.”

      So, here is a new one which was announced on March 27, 2018…

      A totally new type of side-channel attack, called BranchScope, was announced yesterday. BranchScope is the first side-channel attack which targets extracting information by forcing collisions in the branch predictor, and which achieves a success rate of over 99%. Fortunately, BranchScope runs very slowly. It can take BranchScope up to 30 minutes to fully initialize. Mitigating running BranchScope malware is theoretically possible, yet it appears that doing so would have severe performance impacts. More importantly, BranchScope isn’t related to Meltdown. Instead, BranchScope is related to the Spectre vulnerabilities. Intel’s latest CPU microcode which mitigates against Spectre has zero effect on BranchScope. And of course, Microsoft’s Meltdown patches have zero effect on BranchScope.

      I predict that the list of newly discovered methods which exploit the underlying CPU hardware issues will slowly yet exponentially grow over the next several months to years.

      Nothing mitigates BranchScope in any way. Not the Meltdown patches. Not the Intel Spectre patches which Intel implements via new CPU microcode. Presently, it is unclear to me if there actually is any way to mitigate against BranchScope. See:

      BranchScope vulnerability could be the next Spectre/Meltdown flaw for the enterprise

      I do hope that I am raining on everyone’s parade who thinks that Meltdown and Spectre are over-hyped and that such attacks which are based on the underlying and inherent CPU design flaws are not forthcoming. I can assure you that they are since that is what all of the CPU design experts who I have been following are saying, in between the lines, since they realize just how deep this rabbit hole goes. And it would appear that BranchScope could well be the first “bulletproof” new type of attack vector in terms of Microsoft’s Meltdown mitigations and in terms of Intel’s latest CPU microcode mitigations.

      To top all of the above off, another type of vulnerability called SgxPectre was disclosed earlier in March, around March 5, 2018. The SgxPectre vulnerability is capable of reading all the contents of Intel SGX-powered secure enclaves. See:

      Spectre-like attack exposes entire contents of Intel’s SGX secure enclave

      In layman’s terms, it is back to the drawing board in terms of resolving all possible exploit scenarios for the inherent CPU design flaws.

      It is what it is, and it is so far from pretty — six ways from Sunday.

       

      7 users thanked author for this post.
      • #178831

        I almost feel like chucking my PCs and going back to a typewriter and fax machine.

         

        • #178897

          If it is possible, you have understated the scope and extent of the problem. Inside the hardware side of the community, there has been a effort to get Intel to do a complete redesign. In broad terms chip design stopped, while software development took off, and well, here we are. Will this be fixed and will this take time, oh yeah, but there is no choice. Intel put themselves on the hook for this, and some very powerful forces are not letting them off.

          1 user thanked author for this post.
      • #178858

        @ GoneToPlaid

        That’s what you get when Intel prioritized speedy performance over security, in their ha$te to out-market AMD chips during the 1990s.
        ___ What is the point of a faster-performing Intel CPU when the Meltdown & Spectre mitigations result in a performance-hit of about 20%.?

        IMO, branch prediction and speculative execution should not have been introduced by the tech industry. Fake-speed.? … like the fake-RAID of Intel’s RST driver.?
        ___ Branch prediction and speculative execution are like a servant/server trying to predict and speculate on what his/her employer wants to eat for lunch, by processing/peparing 5 different lunch-meals in the morning, based on what the employer had eaten for lunch the previous days. Similarly for the employer’s dinner, supper and breakfast everyday.

        Also, branch prediction and speculative execution use more RAM memory and consume more electricity. Why not just let the CPU be idle when the computer user does not need it, instead of constantly doing predictions and speculations, eg when the user is watching a lengthy movie.?

        3 users thanked author for this post.
        • #178882

          @anonymous

          Interesting, about “branch prediction and speculative execution”.

          Do all brand CPU’s do this now?

        • #178960

          These “branch prediction” and related tech can be right more than 98% of the time. It causes major speedups and uses less power. The only problem was that they let traces of (normally) rare wrong answers leak through.

          “predict/speculate on branch left if that memory I don’t have access to is a 1 otherwise branch right”
          Result: “access denied”
          “But wait it took X microseconds to get access denied, it must be a 0! On to the next bit to reveal!”

          The CPU can still safely predict, it just needs to shuffle the cards after folding.

          • #178974

            ? says:

            one unanimous to another, you’ve isolated the cache side-channel problem! now what? do we build our own mitigation KB’s?

        • #180265

          That is one of the better visual analogies which I have read, and which explains branch prediction and speculative execution in layman’s terms.

      • #178907

        @GonetoPlaid

        You make a lot of sense, but I think your conclusion about the wide range of potential vulnerabilities points to the inadequacy of relying on [buggy] Microsoft patches in the future, at least until chip design catches up.  That leaves your first option.

         

        1 user thanked author for this post.
    • #178834

      Woody :

      Windows 7 x64 Intel processor – I never could get the Jan Security Only update to install, but Feb did. Should I uninstall Feb in this case and install only the March Security Only update when you give the all clear? This is getting a bit much to try and figure out. Thanks

      1 user thanked author for this post.
      • #178879

        I thought that if you have the FEB-update, you automatically have the Jan-update as well? That in each update is incorporated the previous month’s update? Or am I wrong?

        • #178886

          The Monthly ROLLUP is cumulative , so the latest contains all the past updates plus the current ones.

          But the SECURITY-ONLY patches are NOT cumulative – you have to install all of them to be fully protected.

          2 users thanked author for this post.
          • #178894

            Thanks for the clarification PKCano!

            ~ Annemarie

      • #178942

        You may want to consider seeking help for your Windows servicing issue at https://www.sysnative.com/forums/windows-update/.

    • #178842

      As the updates appear to be working I would leave them and wait for more info on the mess that is March W7 updates.

      Why can’t you install the January updates?

      cheers, Paul

      • #178931

        To Paul:

        Windows fails to configure the update at reboot and reverts the changes. I haven’t been able to figure out why. I’m not sure if I am more at risk with only the Feb update installed so I’m going to uninstall it for now. I will be considering switching to Group A and pondering Win 10 or abandoning MS altogether.

    • #178847

      I am so glad that I didn’t install the Win. 7 January or February patches. I kept my head down, because despite all the pressure my gut feeling was that I would be safer risking a Spectre/Meltdown attack. I was right.

      5 users thanked author for this post.
    • #178849

      The patches from  November of 2017 caused so many issues and no fixes from Microsoft that I was forced to reformat. That patch was forced on me my Microsoft since I was not able to change update to the way I had it.

    • #178853

      I think an Anonymous poster on The Register site hits the nail squarely on the head with this comment on the topic “Microsoft’s Windows 7 Meltdown fixes from January, February made PCs MORE INSECURE”:

      “Microsoft ain’t done til Windows 7 won’t run!”

      3 users thanked author for this post.
    • #178900

      This makes the third month in a row where the risk-reward ratio is upside down.

      3 users thanked author for this post.
    • #178909

      I compiled “A really simple test you can compile with cygwin – if it doesn’t crash, the bug is present” from https://news.ycombinator.com/item?id=16693599#16695529 and no matter when March updates I install IT STILL SAYS MY PC IS VULNERABLE.

      I compiled it once with 64 bit gcc and once with Visual Studio 2017 Community and both agree so I’m fairly sure about this.

      PLEASE somebody find out which update is supposed to fix this.

      Edit to remove HTML Please use the “text” tab in the entry box when you copy/paste

      1 user thanked author for this post.
    • #178917

      Perhaps “Total Meltdown” would more accurately be described as “Microsoft Meltdown”.

      I’ve said it before and it bears repeating – my Linux Mint installation looks better and better every day!

      3 users thanked author for this post.
    • #178933

      https://support.microsoft.com/en-hk/help/4088875/windows-7-update-kb4088875 has been updated today. Can anyone see if it is the script that has been altered?

       

      ~ Annemarie

      1 user thanked author for this post.
    • #178944

      A data point: I’ve had March 13, 2018—KB4088875 (Monthly Rollup) installed since March 25 on a home computer, with no apparent problems thus far. The other Windows 7 updates were installed on March 18, also with no apparent problems thus far.

      1 user thanked author for this post.
    • #178948

      Unholy mess is correct. First time I’m reading about this total meltdown thing and like everyone else I am royally p****ed off at Microsoft. I have no idea the best course of action now other than uninstalling both January and February because March certainly isn’t fit for purpose. The only upside is that there are no known exploits as yet but I feel like a mug for keeping updated, thinking I’m doing the right thing and all along making it worse! Microsoft, you are a disgrace to the profession.

      1 user thanked author for this post.
    • #178984

      For me, KB 4088875 has disappeared completely from WU.

      Here’s an possible complication: I installed Gibson’s InSpectre app, and used it to disable the exploit fixes for the time being. Now, on my Win7 x64 machine, the QualityCompat registry item is missing. I’m pretty sure it was there previously. I am running Windows Security Essentials, and I vaguely remember checking to see if it had made the registry changes, and it had. I used InSpectre to reapply the fixes, and restarted my machine; InSpectre indicates the fixes as being in place, but the QualityCompat registry item is still missing.

      Now what do I do? Can I safely add the QualityCompat item manually?

      • #179451

        Well, I was wrong–it’s Malwarebytes! If I set Malwarebytes to start automatically, the QualityCompat registry item disappears at boot. Google revealed a discussion on the Malwarebytes forum about this behavior.

        Can someone please confirm?

    • #179065

      Win7-64Pro_SP1, Office 2010, Group B for OS and IE, WU for Office and .NET.

      An unholy mess! Well said! I personally would describe it differently and with far more vivid terms, but the posting rules and decorum were made to prevent such an occurrence. 🙂

      Both of my remaining Win7 computers (laptop and desktop) are up to date with the exception of the March Security Only patches. No negative effects from the March IE and Office 2010 patches, or the older Jan/Feb patches as far as booting, BSODs, etc.

      However, on the laptop (4th Generation i5), after the Jan/Feb Security Only patches, and a Lenovo UEFI update it is SLOW due to the Spectre/Meltdown mitigations. Boot time has gotten 40% longer, and AV scans are slower. Some program launches are slower to load, but run normally. Inspectre utility says “not vulnerable” to both Spectre and Meltdown. The laptop; is not for any gaming or daily usage, but for photo-editing when on travel and email, although the email task has largely been eclipsed by the iPad Pro (thinner, lighter, more reliable, less of a [pain], etc.). However the photo-editing programs are Windows only, although there are Mac versions available from the camera manufacturer at no cost. This device would be a good Linux candidate, but I just do not like Gimp, a Linux photo editor.

      The desktop (i7-960 and Intel brand MB), and my preferred PC, will never get a new BIOS or firmware update for the Spectre/Meltdown issue. The only impact I see from the January/Feb Meltdown “fixes” is searches are slower. Apparently, according the Intel website, they have no access to the programming (or more likely to laid off programmers) of the BIOS or firmware of that age device(s). So be it. This box is the gaming machine and the main PC and runs like a top on Windows 7 and the games are not adversely affected..

      I have been planning (and delaying) a Linux build to replace the desktop for over a year. I tell myself the delay is partially to wait for Ubuntu 18.04 LTS and the next gen Linux Mint, however I find in all honesty, I just have heartburn paying for Intel CPUs with a major feature (now called a flaw), and with no fix of the feature/flaw on the near horizon. AMD may be an option, but I have found Intel-based systems are easier, due to market share, when trying to resolve an issue under Linux.

      I am now at the point where I find I have to make decisions within the following parameters. Win10 is absolutely, positively out for all the reasons so often discussed on this and other sites, plus I absolutely, positively will not reward MS for their sabotage and negligence. I enjoy gaming as relaxation, but I am now finding the aggravation of the updating has negated the fun of keeping Windows for the gaming, and just general PC use and productivity. Patching is one thing, but needing to run VBScripts in order to patch a STANDARD WU offered patch is another. BTW, how does a regular user, (i.e., the PC as an appliance user) address that issue? I am leaning towards Noel’s tact of uninstalling the January and February OS patches to fix the “new” vulnerability caused by the flawed patches, and just running unpatched until such time as it is fixed. However, I honestly do not see ‘being fixed’ as possible as I believe this current situation is as much by deliberate design as GWX was. I am sure it is merely coincidence that this is occurring as reports are showing progress in Win10 adoption by the enterprise – the only customers with the clout to get MS attention.

      I will just start the Linux build. Some of the games are available on Linux under Steam, and I guess I will just have to learn to like Gimp. That will become the main PC, with the Win7 desktop to be the backup for those rare Windows critical tasks, and gaming.

      6 users thanked author for this post.
      • #179078

        Bill:

        If you have 64-bit Linux as your host OS, and if you have sufficient memory (say, 8GB), you can install VMWare Workstation Player, then install Windows 7 and all of your Windows software in a virtual machine. This will make your transition to Linux a lot easier, because Windows will be just a click away if you can’t do a particular task under Linux.

        Jim

        Group "L" (Linux Mint)
        with Windows 10 running in a remote session on my file server
        3 users thanked author for this post.
        • #179088

          Thanks @MrJimPhelps.

          I was just reading your comments on the Linux for Windows wonks and was beginning to see that as a potential solution. Since I will be building the box, I was going to go with 8 or 16GB of ram, so a VM have enough RAM to work.

          I am not familiar with actually working with VMs, so forgive it this question is a bit amateurish, but could you use an existing Windows install on a HDD (assuming it is for the hardware you have), to launch in the VM? I like the concept of the VM as I do not want to do a dual boot since I have had problems in the past with an update to Linux messing up the dual bootability. The dual boot capabilities are now much improved, but I would prefer to avoid that issue.

          I had also been thinking of using a removable drive caddy, but from my reading they are not designed for routine swapping (at least not the lower cost ones).

          2 users thanked author for this post.
    • #179067

      So, can I make the modest assumption that if I’m using an updated browser, Firefox Quantum 59.0.2, and my anti-virus/security software, Norton, is checked for updates daily, I’m in relatively safe terrritory for now?

      • #181395

        Yes. FF Quantum prevents Meltdown. Spectre would require malware to actually get installed on your computer. Malware which either you directly download and install on your computer, or malware which somehow your antivirus program misses while you are browsing the Internet.

    • #179087

      Security update KB4100480 was released by Microsoft on March 29, 2018. I believe this update fixes the Total Meltdown vulnerability. More info: Windows kernel update for CVE-2018-1038.

      2 users thanked author for this post.
      • #179704

        @Mr,Brian:  Thank you for posting this information about the KB 4100480 once again.   I am hoping that it will be there when I check my updates.    Your help is appreciated more than words could ever express, and I know all of the other members feel the same way.  Thank you, thank you, thank you!    🙂

    • #179287

      I had been doing most Windows 7 updates all along (often with a couple week delay), until the so-called Meltdown patch came out in January. I shut off all updates on all of my Windows 7 computers (6) then because I didn’t trust MS to be able to put out that big a change to the OS that quickly. I just assumed they would screw up again. So all of my computers never got the botched patches. I am still holding off until it seems like they figured out what they are doing. I agree with everyone here who said that MS fired all the old programmers and replaced them with people who simply don’t know what they are doing. Windows patching was never so precarious in years past. I am running antivirus and malwarebytes, and have my router locked down pretty tight. So far I haven’t had any problems.

    • #179390

      Thanks MrBrian. Just installed KB4100480 which closes the vulnerabilities opened by the Jan./Feb. updates. (Did I read the Microsoft summary correctly?) Everything tickety boo.

    • #179438

      @MrBrian Has anyone been able to test whether disabling the meltdown/spectre protections with Inspectre has any effect on its own? Or would the patches need to be removed?

      • #179457

        I don’t know offhand. I’d prefer installing KB4100480 instead of uninstalling updates.

        5 users thanked author for this post.
        • #179469

          I am hunkering down and doing nothing now until DEFCON moves up. I’m with walker, much of this is way above my pay grade. Thanks to all the techies for the info.

        • #179472

          Here is the MS info and the way I understand it,

          1-an attacker would have to physically log on your machine to take advantage of it

          2- If you have installed ANY of the updates since 1/1/18, you should install 4100480:

          CVE-2018-1038 | Windows Kernel Elevation of Privilege Vulnerability
          Security Vulnerability
          Published: 03/29/2018
          MITRE CVE-2018-1038

          On this page
          Executive Summary
          Exploitability Assessmen
          Affected Products
          Mitigations
          Workarounds
          FAQ
          Acknowledgements
          Disclaimer
          Revisions

          An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

          To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system.

          The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.

          FAQ

          I am running Windows 7 or Windows Server 2008 R2 on my system. At what point do I need to install security update 4100480?

          If you are running Windows 7 for x64-based Systems or Windows Server 2008 R2 for x64-based Systems, and you have installed any of the servicing updates released during or after January 2018, you need to install 4100480 immediately to be protected from this vulnerability.

          https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-1038

          PS: So in my case, I installed Jan. & Feb. Rollups so this update would be critical for me other than the fact that no one else physically accesses my computers. Is that correct?

          Don't take yourself so seriously, no one else does 🙂
          All W10 Pro at 22H2,(2 Desktops, 1 Laptop).

          2 users thanked author for this post.
          • #179641

            “PS: So in my case, I installed Jan. & Feb. Rollups so this update would be critical for me other than the fact that no one else physically accesses my computers. Is that correct?”

            No. Malware could exploit this also.

            1 user thanked author for this post.
        • #179473

          Oh, no worries there! I never wanted to remove the updates, I was just afraid that’s what I would be told needed to be done. I’m digging in deep until Woody changes the Def-con level, this stuff is so far over my head its not even funny anymore.

    • #179544

      So, can I make the modest assumption that if I’m using an updated browser, Firefox Quantum 59.0.2, and my anti-virus/security software, Norton, is checked for updates daily, I’m in relatively safe territory for now?

      Perhaps. It also depends on whether or not your computer is a desktop computer or a laptop computer. If your computer is a laptop computer and/or if Lojack for laptops is either activated by default in the computer’s BIOS, or was installed by you, then this program launches hidden instances of Internet Explorer. Lojack by all accounts should be considered to be malware, due to its inherent design flaws which are exploitable.

      Launch Task Manager. If you see that IE is running and even though it is hidden from view, then IE presents an attack vector. Lojack launches hidden instances of IE, and this is what you are looking for under Task Manager. Thus, make sure that you have installed the latest security updates for IE if you see that IE is running under Task Manager, yet IE is hidden from your view.

      • #179649

        HP ZBook 17 w/Intel i7-Quad Core. I see windows.exe in Processes. Don’t know what you mean by “hidden instances”. How do I update IE? I opened IE, (first time in ages), says I am running vers. 11.

      • #179650

        PS What is Lojack?

      • #179654

        Apologies for the string of replies. IE vers. says 11.0.9600.18920. Update vers. shown is 11.0.51, KB4074736. Do I click on “Update” and it will do its thing?

        • #179655

          KB 4074736 is the Win8.1 stand-alone cumulative update for IE11. It has to be downloaded from the MS Update Catalog and manually installed.

          If you install the Feb Rollup KB 4074594 through Win Update, it will contain that patch and you don’t have to install it separately.

          1 user thanked author for this post.
    • #179578

      Woody hasn’t given the go-ahead to do anything yet. Microsoft is recommending to install KB4100480 “immediately” if you previously installed any of the updates listed at https://support.microsoft.com/en-us/help/4100480/windows-kernel-update-for-cve-2018-1038. I installed KB4100480 last night.

      MrBrian

      I just checked my installed updates and the only one I have on the MS list is KB4074598 installed on 3/7/18.

      When I did a manual windows update check just now,  I still have kb4088875 (march rollup unchecked), and removal tool checked.
      have not installed either.

      new to this update check is
      kb4100480 (checked important)
      kb4099950 (optional not checked)

      Because I have one of the listed MS updates installed should I be installing kb4100480 or do I wait.

      At the moment I am not having any issues.

      Dell Inspiron 660 (purchased in 2013) just replaced hard drive in November 2017 and had Windows 7 reloaded.
      Windows 7 Home Premium 64 bit SP 1
      Server 2008 R2 x64

      Processor:  Intel i3-3240 (ivy bridge 3rd generation)
      chipset Intel (R) 7 series/C216
      chipset family SATA AHCI Controller -1 E02

       

      After new hard drive installed  went to Group A

    • #180267

      PS What is Lojack?

      LoJack for Laptops is anti-theft software for laptop computers. Many laptop manufacturers have LoJack baked into the laptop’s BIOS. LoJack in the BIOS may already be activated by the laptop manufacturer, or may be manually activated by the user, or may be activated when the laptop owner signs up for the service. LoJack was created by Absolute Software.

    • #181373

      Hi guys, this is my first post here.  I sent Woody an email with my experience and suggestions on how to stop Win 10 from its continuous and forced attempts to upgrade, and he asked me to post it here.  So here I go.  (FYI: I still have version 1703, because version 1709 destroys my WiFi and therefore renders my laptop useless, so I’m avoiding this upgrade as far as I can.)

      I do the following:

      1. Disable Windows Update service. But as you know, Win 10 doesn’t care about that and enables it without your permission, so I constantly check if Windows has enabled it.  In that case, I disable it again (and again, and again…).

      2. When the Windows 10 Update Assistant pops up, I open the Task Manager and manually force the task to end.

      3. This is the most important step.  I keep checking the folder C:\Windows\SoftwareDistribution\Download, where Windows downloads the upgrades.  Then I permanently delete all folders and files located there (with Shift-Del, and with Administrator rights).  In case Windows doesn’t let you delete them, you should go back to steps 1 and 2 (that is, force those tasks and services to end).  In any case, it’s not necessary to wipe out every file or folder from C:\Windows\SoftwareDistribution\Download, because Windows won’t install an upgrade if the download is incomplete.  That is, Windows checks the integrity of that folder before installing anything.

      Repeat steps 1, 2 and 3 every now and then, with infinite patience…  It’s a torture, I know, but in this way I’ve been able to avoid Windows from installing version 1709.

      In practice, what I do is keep checking periodically the folder C:\Windows\SoftwareDistribution\Download.  If it’s not empty, it means Windows is forcing again the download of the upgrades.  So I repeat steps 1 through 3.

      This even works if Windows tells you it is ready for installing the upgrade (that is, it has downloaded everything and checked for the integrity of the download).  In this case, just delete all files from C:\Windows\SoftwareDistribution\Download, and Windows won’t be able to install the update.

      Hope this helps a little.

      Bernie

      4 users thanked author for this post.
    • #181390

      The text in the Windows 7 March 2018 updates KB4088881, KB4088875, and KB4088878 has been changed in a manner that suggests that KB4099950 is now being bundled with these three updates for those installing them via Windows Update or WSUS. I believe that this bundling does not happen for those using the Catalog versions of these three updates.

      1 user thanked author for this post.
    • #181678

      There are signs that another Windows 7 update may be available soon. Article KB4091290, updated today, contains a reference to update KB4093118, which isn’t available now.

      3 users thanked author for this post.
      • #181777

        KB4093118 probably is the patch tueday rollup, and they are relaxing (lifting) the QualityCompat Allow key requirement, like Windows 10

        1 user thanked author for this post.
      • #181990

        @Mr.Brian:

        Since the MSDefcon is now at “3”, what is the best way to deal with all of this nightmare “mess”??     Should we NOT even check for updates at all, to be safe?  Things are so intimidating I am having nightmares about them.   Anyone else have any thoughts on this horrible situation?   🙁

        • #182054

          You’ll first have to decide whether to install any updates this month.

          1 user thanked author for this post.
    Viewing 42 reply threads
    Reply To: Reply #178942 in Microsoft Patch Alert: Suddenly, Windows 7 patching is an unholy mess

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information:




    Cancel