Buggy updates caused problems with some Windows rigs
It's been a bit of a rough month for Microsoft and various Windows users, at least in terms of software updates. It started with Microsoft telling Windows 10 Preview users to uninstall Office prior to applying Patch Tuesday updates or else the installer would fail. However, it's not only uses of pre-release software who ran into trouble. Microsoft has gone and pulled two security patches because they were causing problems for some users.
Microsoft's Gabriel Aul of the Windows Preview team tweeted out some inconvenient news to Windows 10 users who have Office installed. In order to install the crop of updates for this month's Patch Tuesday, Windows 10 users will have to first uninstall Office, or the installer will fail. Once all the security patches are applied, users are free to then reinstall Office on their Windows 10 rigs.
The second Tuesday of every month is known as Patch Tuesday for Windows users, and if you didn't install yesterday's batch of security updates, there's a good reason why you might want to put it on your short-term list of things to do. One of the patches in yesterday's Tuesday roundup addresses a critical bug in Windows that went unnoticed for 19 years and is present in every version of the OS from Windows 95 on up.
Just when you thought that BSODs were a thing of the past
After installing Microsoft's August 2014 Patch Tuesday updates, you may have noticed some wonky behavior in Windows. If you're especially unluckly, you may have even been experiencing those dreaded Blue Screen of Death errors that have largely been eradicated in recent years. It turns out there's some potentially buggy code that could cause BSODs after installing the updates, which prompted Microsoft to pull the patch offline while it investigates the issue.
Make your Windows XP-using friends/family members read this important PSA
Microsoft has officially pulled the plug on support for Windows XP. That’s it. Finite. Done. No more. Don’t expect to see any future patches, services packs, fixes, hotfixes, critical updates, anything — if you’re one of the one-fourth of desktop users or so who are still running the antiquated operating system (yes, there’s that many of you), you’re about to enter the Wild Wild West of computing.
A couple of last minute additions to Patch Tuesday address security holes in Windows XP
Today is the second Tuesday of the month, which means it's time to download a collection of security fixes from Microsoft. Otherwise known as Patch Tuesday, today's collection includes seven security bulletins, including two late additions that fill up patch remote code execution holes in Windows XP. These are some of the last updates Windows XP will ever receive, as Microsoft plans to stop supporting the legacy OS on April 8, 2014.
Microsoft has certainly had better Patch Tuesdays than the one that occurred last week. Throughout the week, the Redmond software giant has been pulling faulty security updates and re-issuing patches, and assuming it's all sorted out now, the total number of bad updates comes to six. They include KB 2876063, KB 2859537, KB 2843872, KB 2843638, KB 2843639, and KB 286846.
Microsoft today issued an advance notification of this month’s “Patch Tuesday” security updates for Windows and other software developed by it. According to its security bulletin advance notification for July 2012, Microsoft will deliver three “critical” and twice as many “important” security updates next Tuesday. Hit the jump for more.
Microsoft will deliver six security bulletins on April 10, 2012 as part of its monthly security update, the Redmond-based company said in an advance notification Thursday. The six security bulletins will, between them, address 11 vulnerabilities in Windows, Office, Internet Explorer, SQL Server. .NET Framework and Forefront Unified Access Gateway. Hit the jump for more.
Hey folks, it's time to patch your Windows PCs! Somebody tipped Microsoft off to a vulnerability in the way Windows handles the remote desktop protocol, and the problem turned out to be a biggie: the exploit allows attackers to run code without any user permissions whatsoever, and all Windows operating systems from XP on up are affected. The good news is that Microsoft has already issued a security patch for the problem. The bad news? Microsoft has taken the unusual step of suggesting you install the patch immediately, since it expects baddies to exploit the gaping security hole quickly.