January 19, 2018—KB4057400 (Preview of Monthly Rollup)
Applies To
Windows 7 Service Pack 1 Windows Server 2008 R2 Service Pack 1Release Date:
1/19/2018
Version:
Preview of Monthly Rollup
Improvements and fixes
This non-security update includes improvements and fixes that were a part of KB4056894 (released January 4, 2018) and also includes these new quality improvements as a preview of the next Monthly Rollup update:
-
Addresses issue where every smart card logon to a Windows Terminal Server/Remote Desktop Server may result in a handle leak in the certprop service. Token leaks result in session leaks on computers that have installed MS16-111/KB3175024 and superseding fixes.
-
Adds support for the SHA2 server’s authentication endpoint support for the Windows Server Update Services server.
For more information about the resolved security vulnerabilities, see the Security Update Guide.
Notes
Important Please apply KB4100480 immediately after applying this update. KB4100480 resolves an elevation of privilege vulnerability in the Windows Kernel for the 64-Bit (x64) version of Windows. This vulnerability is documented in CVE-2018-1038.
Known issues in this update
Symptom |
Workaround |
Because of an issue that affects some versions of antivirus software, this fix applies only to computers on which the antivirus ISV updated the ALLOW REGKEY. |
The issue is resolved in KB4093113. You no longer need the following ALLOW REGKEY to detect and be offered this update: HKEY_LOCAL_MACHINE"Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat\cadca5fe-87d3-4b96-b7fb-a231484277cc
|
The LSM.EXE process and applications that call SCardEstablishContext or SCardReleaseContext may experience a handle leak. Once the leaked handle count reaches a certain threshold, smart card-based operations fail with error "SCARD_E_NO_SERVICE". Confirm the scenario match by reviewing the handle counts for LSM.EXE and the calling processes in the process tab of Task Manager or an equivalent application. |
This issue is resolved in KB4091290. |
After installing KB4056897 or any other recent monthly updates, SMB servers may experience a memory leak for some scenarios. This occurs when the requested path traverses a symbolic link, mount point, or directory junction and the registry key is set to 1: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\LanManServer\Parameters\EnableEcp |
This issue is resolved in KB4103718. |
How to get this update
This is provided as an Optional update on Windows Update. For more information about how to run Windows Update, see How to get an update through Windows Update. To get the standalone package for this update, go to the Microsoft Update Catalog website.
File information
For a list of the files that are provided in this update, download the file information for update 4057400.