Improvements and fixes
This update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:
Provides support to control usage of Indirect Branch Prediction Barrier (IBPB) within some AMD processors (CPUs) for mitigating CVE-2017-5715, Spectre Variant 2 when switching from user context to kernel context (See AMD Architecture Guidelines around Indirect Branch Control and AMD Security Updates for more details). Follow instructions outlined in KB4073119 for Windows Client (IT Pro) guidance and KB4072698 for Windows Server guidance to enable usage of IBPB within some AMD processors (CPUs) for mitigating Spectre Variant 2 when switching from user context to kernel context.
Addresses an issue that causes an access violation in Internet Explorer when it runs on the Microsoft Application Virtualization platform.
Addresses an issue in Enterprise Mode related to redirects in Internet Explorer and Microsoft Edge.
Addresses an issue that generates an access violation on certain pages in Internet Explorer when it renders SVGs under a high load.
Addresses additional issues with updated time zone information.
Addresses an issue that might cause the App-V service to stop working on an RDS server that hosts many users.
Addresses an issue where user accounts are locked when applications are moved to a shared platform using App-V (e.g., XenApp 7.15+ with Windows Server 2016, where Kerberos authentication isn't available).
Addresses an issue with printing content generated by ActiveX in Internet Explorer.
Addresses an issue that causes document.execCommand("copy") to always return False in Internet Explorer.
Addresses an issue that, in some instances, prevents Internet Explorer from identifying custom controls.
- Security updates to Internet Explorer, Microsoft Edge, Windows kpp platform and frameworks, Microsoft scripting engine, Windows graphics, Windows Server, Windows kernel, Windows datacenter networking, Windows wireless networking, Windows virtualization and Kernel, and Windows Hyper-V.
If you installed earlier updates, only the new fixes in this package will be downloaded and installed on your device.
For more information about the resolved security vulnerabilities, see the Security Update Guide.
Known issues in this update
How to get this update
This update will be downloaded and installed automatically from Windows Update. To get the stand-alone package for this update, go to the Microsoft Update Catalog website.
Important When you install both the servicing stack update (SSU) (KB4099989) and the latest cumulative update (LCU) from the Microsoft Update Catalog, install the SSU before installing the LCU.
For a list of the files that are provided in this update, download the file information for cumulative update 4093112 .