-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
********************************************************************
Title: Microsoft Security Advisory Notification
Issued: July 10, 2018
********************************************************************
Security Advisories Released or Updated on July 10, 2018 ===================================================================
* Microsoft Security Advisory ADV170017
- Title: Microsoft Office Defense in Depth Update
- https://portal.msrc.microsoft.com/en-US/security-guidance/
advisory/ADV170017
- Reason for Revision: Microsoft is announcing the release of new
updates for ADV170017 that further enhance security for supported
editions of Microsoft Office 2010, Microsoft Office 2013, and
Microsoft Office 2016. Microsoft recommends that customers
follow the instructions in FAQ #1 to download and install the
updates.
- Originally posted: October 10, 2017
- Updated: July 10, 2018
- Version: 3.0
* Microsoft Security Advisory ADV180002
- Title: Guidance to mitigate speculative execution side-channel
vulnerabilities
- https://portal.msrc.microsoft.com/en-US/security-guidance/
advisory/ADV180002
- Reason for Revision: Updated FAQ #15 to announce that the
following security updates provide additional mitigations for
AMD processors for CVE-2017-5715: 1. Security update 4338815
(monthly rollup) or 4338824 (security only) for Windows 8.1,
Windows Server 2012 R2, or Windows Server 2012 R2 (Server Core
installation) - see
https://support.microsoft.com/en-us/help/4338815/ or
https://support.microsoft.com/en-us/help/4338824/ for more
information. 2. Security update 4338830 (monthly rollup) or
4338820 (security only) for Windows Server 2012 or Windows
Server 2012 (Server Core installation) - see
https://support.microsoft.com/en-us/help/4338830/ or
https://support.microsoft.com/en-us/help/4338820/ for more
information. 3. Security update 4340583 for Windows Server 2008
or Windows Server 2008 (Server Core installation) - see
https://support.microsoft.com/en-us/help/4340583/ for more
information. 2. As of July 10, 2018, this advisory has been
completely updated to provide customers with the most up-to-date
information to protect systems from speculative side-channel
execution vulnerabilities CVE-2017-5753, CVE-2017-5715, and
CVE-2017-5754. Some content has been removed for simplicity and
because it is no longer relevant. You can view the archived
content for ADV180002 in the FAQ section following the
Affected Products table.
- Originally posted: January 3, 2018
- Updated: July 10, 2018
- Version: 21.0
* Microsoft Security Advisory ADV180012
- Title: Microsoft Guidance for Speculative Store Bypass
- https://portal.msrc.microsoft.com/en-US/security-guidance/
advisory/ADV180012
- Reason for Revision: Microsoft is announcing that the Windows
security updates released on July 10, 2018 include support
for Speculative Store Bypass Disable (SSBD) in Intel processors.
This support is available for all supported editions of Windows
Server 2008, Windows Server 2012, Windows 8.1, and Windows
Server 2012 R2. See the Affected Products table for the security
updates, and the Recommended Actions section to follow the steps
for applying updates to mitigate CVE-2018-3639 - Speculative Store
Bypass (SSB), Variant 4.
- Originally posted: May 21, 2018
- Updated: July 10, 2018
- Version: 3.0
* Microsoft Security Advisory ADV180016
- Title: Microsoft Guidance for Lazy FP State Restore
- https://portal.msrc.microsoft.com/en-US/security-guidance/
advisory/ADV180016
- Reason for Revision: Microsoft is announcing that the Windows
security updates released on July 10, 2018 provide mitigations for
CVE-2018-3665 - Lazy FP State Restore. These updates are available
for Windows Server 2008 R2, Windows Server 2012, Windows Server
2012 R2, and x64-based versions of Windows 8.1 and
Windows 10. See the Affected Products table to download and install
the security updates.
- Originally posted: June 13, 2018
- Updated: July 10, 2018
- Version: 2.0
* Microsoft Security Advisory ADV180017
- Title: July 2018 Adobe Flash Security Update
- https://portal.msrc.microsoft.com/en-US/security-guidance/
advisory/ADV180017
- Reason for Revision: Information published.
- Originally posted: July 10, 2018
- Version: 1.0
Other Information
=================
Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.