{"id":62497,"date":"2018-08-15T10:32:48","date_gmt":"2018-08-15T01:32:48","guid":{"rendered":"https:\/\/www.softantenna.com\/wp\/?p=62497"},"modified":"2018-08-15T10:32:48","modified_gmt":"2018-08-15T01:32:48","slug":"windows-10-cumulative-update-kb4343909","status":"publish","type":"post","link":"https:\/\/softantenna.com\/blog\/windows-10-cumulative-update-kb4343909\/","title":{"rendered":"Microsoft\u3001Windows 10 Version 1803\u7528\u306e\u7d2f\u7a4d\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8KB4343909\u7b49\u3092\u30ea\u30ea\u30fc\u30b9 - \u6708\u4f8b\u66f4\u65b0\u306e\u4e00\u74b0\u3068\u3057\u3066"},"content":{"rendered":"<p><img decoding=\"async\" style=\"display:block; margin-left:auto; margin-right:auto;\" src=\"https:\/\/softantenna.com\/blog\/wp-content\/uploads\/2018\/08\/s_20180815_101243.jpg\" alt=\"S 20180815 101243\" title=\"s_20180815_101243.jpg\" border=\"0\" width=\"973\" height=\"691\" \/><\/p>\n<p>Microsoft\u306f\u672c\u65e5\u3001Windows 10 Version 1803(Windows 10 April 2018 Update)\u7528\u306e\u7d2f\u7a4d\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343909\">KB4343909<\/a>\u3092\u30ea\u30ea\u30fc\u30b9\u3057\u307e\u3057\u305f(<a href=\"https:\/\/www.neowin.net\/news\/microsoft-releases-windows-10-builds-17134228-16299611---here039s-what039s-new\">Neowin<\/a>)\u3002<\/p>\n<p>\u6bce\u6708\u7b2c2\u706b\u66dc\u65e5(\u7c73\u56fd\u6642\u9593)\u306b\u516c\u958b\u3055\u308c\u308b\u6708\u4f8b\u66f4\u65b0\u306e\u4e00\u8cab\u3068\u3057\u3066\u516c\u958b\u3055\u308c\u305f\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3067\u3001Version 1709\u7528\u306e<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343897\">KB4343897<\/a>\u3001Version 1703\u7528\u306e<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4018124\">KB4018124<\/a>\u3001Version 1607\u7528\u306e<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4000825\">KB4000825<\/a>\u3001RTM\u7528\u306e<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343892\">KB4343892<\/a>\u3082\u540c\u6642\u306b\u516c\u958b\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u306a\u304a\u4e00\u822c\u30e6\u30fc\u30b6\u30fc\u5411\u3051\u306e\u7d2f\u7a4d\u7684\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u63d0\u4f9b\u306fVersion 1703\u307e\u3067\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002Windows 10\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u3054\u3068\u306e\u30b5\u30dd\u30fc\u30c8\u671f\u9593\u306f<a href=\"https:\/\/support.microsoft.com\/ja-jp\/help\/13853\/windows-lifecycle-fact-sheet\">Windows \u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u306e\u30d5\u30a1\u30af\u30c8 \u30b7\u30fc\u30c8<\/a>\u3067\u3054\u78ba\u8a8d\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306f\u30b7\u30b9\u30c6\u30e0\u306e\u54c1\u8cea\u3092\u6539\u5584\u3059\u308b\u3082\u306e\u3067\u3001\u65b0\u305f\u306a\u6a5f\u80fd\u306f\u8ffd\u52a0\u3055\u308c\u3066\u3044\u307e\u305b\u3093\u3002<\/p>\n<p>\u305d\u308c\u305e\u308cWindows Update\u3092\u5229\u7528\u3057\u3066\u5c0e\u5165\u3059\u308b\u3053\u3068\u304c\u53ef\u80fd\u3067\u3001\u5909\u66f4\u5185\u5bb9\u306f\u4ee5\u4e0b\u306e\u901a\u308a\u3067\u3059\u3002<\/p>\n<h2>KB4343909 (OS Build 17134.228)<\/h2>\n<p>Version 1803\u7528\u306e\u7d2f\u7a4d\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343909\">KB4343909<\/a>\u3067\u306f\u3001Intel Core\/Xenon\u30d7\u30ed\u30bb\u30c3\u30b5\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u65b0\u3057\u3044\u6295\u6a5f\u7684\u5b9f\u884c\u30b5\u30a4\u30c9\u30c1\u30e3\u30f3\u30cd\u30eb\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b\u4fdd\u8b77\u306e\u63d0\u4f9b\u3084\u3001\u4e00\u90e8\u306eAMD\u30d7\u30ed\u30bb\u30c3\u30b5\u3067CPU\u306e\u4f7f\u7528\u7387\u304c\u9ad8\u304f\u306a\u308a\u51e6\u7406\u6027\u80fd\u304c\u4f4e\u4e0b\u3059\u308b\u554f\u984c\u306e\u4fee\u6b63\u3001\u30ec\u30b8\u30e5\u30fc\u30e0\u5f8c\u30a2\u30d7\u30ea\u304c\u30e1\u30c3\u30b7\u30e5\u66f4\u65b0\u3092\u53d7\u3051\u53d6\u308c\u306a\u3044\u554f\u984c\u306e\u4fee\u6b63\u306a\u3069\u304c\u884c\u308f\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<blockquote>\n<ul class=\"ng-scope\">\n<li class=\"\">Provides protections against a new&nbsp;speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\">CVE-2018-3620<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\">CVE-2018-3646<\/a>). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&amp;sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&amp;reserved=0\" target=\"_blank\">Windows Client<\/a> and <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&amp;sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&amp;reserved=0\" target=\"_blank\">Windows Server<\/a> guidance KB articles. (<em>These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)<\/em><\/li>\n<li class=\"\">Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\">CVE-2017-5715<\/a> \u2013 Branch Target Injection).<\/li>\n<li class=\"\">Addresses an issue that prevents apps from receiving mesh updates after resuming. This issue occurs for apps that use Spatial Mapping mesh data and participate in the Sleep or Resume cycle.&nbsp;<\/li>\n<li class=\"\">Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.&nbsp;<\/li>\n<li class=\"\">Addresses an issue that prevents some applications running on HoloLens, such as Remote Assistance, from authenticating after upgrading from Windows 10, version 1607, to Windows 10, version 1803.&nbsp;<\/li>\n<li>Addresses an issue that significantly reduced battery life after upgrading to Windows 10, version 1803.&nbsp;<\/li>\n<li>Addresses an issue that causes Device Guard to block some <strong>ieframe.dll<\/strong> class IDs after installing the May 2018 Cumulative Update.&nbsp;<\/li>\n<li>\n<p><span><span><span><span>Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) <u>and<\/u> a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is&nbsp;\u201cThis module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement.\u201d&nbsp;For more information, see <\/span><\/span><\/span><span><span><span><a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8200&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=kSZ7s7nk9hHky\/03rwqdcaoAMJdwJwd%2BsltaI4ODW\/s%3D&amp;reserved=0\"><span>https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8200<\/span><\/a> <\/span><\/span><\/span><span><span><span>and <\/span><\/span><\/span><span><span><span><a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/aka.ms\/PSModuleFunctionExport&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=muUIr\/qbRp8\/%2B5fPfLzgY8OcpAEVxR3s9gS5bI6aFAg%3D&amp;reserved=0\"><span>https:\/\/aka.ms\/PSModuleFunctionExport<\/span><\/a><\/span><\/span><\/span><span><span><span>.<\/span><\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p>Addresses an issue that was introduced in the July 2018 .NET Framework update. Applications that rely&nbsp;on COM components were failing to load or run correctly because of \u201caccess denied,\u201d \u201cclass not registered,\u201d or \u201cinternal failure occurred for unknown reasons\u201d errors.<\/p>\n<\/li>\n<li>Security updates to Windows Server.<\/li>\n<\/ul>\n<\/blockquote>\n<p>\u65e2\u77e5\u306e\u4e0d\u5177\u5408\u306f\u5b58\u5728\u305b\u305a\u3001\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306f<a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4343909\">Microsoft Update Catalog<\/a>\u304b\u3089\u5165\u624b\u3059\u308b\u3053\u3068\u3082\u53ef\u80fd\u3067\u3059\u3002<\/p>\n<h2>KB4343897 (OS Build 16299.611)<\/h2>\n<p>Version 1709\u7528\u306e\u7d2f\u7a4d\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343897\">KB4343897<\/a>\u3067\u306f\u3001Intel Core\/Xenon\u30d7\u30ed\u30bb\u30c3\u30b5\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u65b0\u3057\u3044\u6295\u6a5f\u7684\u5b9f\u884c\u30b5\u30a4\u30c9\u30c1\u30e3\u30f3\u30cd\u30eb\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b\u4fdd\u8b77\u306e\u63d0\u4f9b\u3084\u3001\u4e00\u90e8\u306eAMD\u30d7\u30ed\u30bb\u30c3\u30b5\u3067CPU\u306e\u4f7f\u7528\u7387\u304c\u9ad8\u304f\u306a\u308a\u51e6\u7406\u6027\u80fd\u304c\u4f4e\u4e0b\u3059\u308b\u554f\u984c\u306e\u4fee\u6b63\u3001\u30c8\u30fc\u30af\u30f3\u30d0\u30a4\u30f3\u30c7\u30a3\u30f3\u30b0\u30d7\u30ed\u30c8\u30b3\u30ebv0.16\u306e\u30c9\u30e9\u30d5\u30c8\u7248\u306e\u30b5\u30dd\u30fc\u30c8\u3059\u308b\u305f\u3081\u306e\u66f4\u65b0\u306a\u3069\u304c\u884c\u308f\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<blockquote>\n<ul>\n<li>Provides protections against a new&nbsp;speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\">CVE-2018-3620<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\">CVE-2018-3646<\/a>). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&amp;sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&amp;reserved=0\" target=\"_blank\">Windows Client<\/a> and <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&amp;sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&amp;reserved=0\" target=\"_blank\">Windows Server<\/a> guidance KB articles. (<em>These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.<\/em>)<\/li>\n<li>Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\">CVE-2017-5715<\/a> \u2013 Branch Target Injection).<\/li>\n<li class=\"\">Updates support for the draft version of the Token Binding protocol v0.16.&nbsp;<\/li>\n<li>Addresses an issue that causes Device Guard to block some <strong>ieframe.dll<\/strong> class IDs after the May 2018 Cumulative Update is installed.&nbsp;<\/li>\n<li>Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.<\/li>\n<li>Addresses an issue that displays \u201cAzureAD\u201d as the default domain on the sign-in screen after installing the July 24, 2018 update on a Hybrid Azure AD-joined machine. As a result, users may fail to sign in in&nbsp;Hybrid Azure AD-joined scenarios when users provide only their username and password.&nbsp;<\/li>\n<li>Addresses an issue that adds additional spaces to content that's copied from Internet Explorer to other apps.<\/li>\n<li>\n<p><span><span><span><span>Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) <u>and<\/u> a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is&nbsp;\u201cThis module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement\u201d. For more information, see <\/span><\/span><\/span><span><span><span><a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8200&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=kSZ7s7nk9hHky\/03rwqdcaoAMJdwJwd%2BsltaI4ODW\/s%3D&amp;reserved=0\"><span>https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8200<\/span><\/a> <\/span><\/span><\/span><span><span><span>and <\/span><\/span><\/span><span><span><span><a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/aka.ms\/PSModuleFunctionExport&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=muUIr\/qbRp8\/%2B5fPfLzgY8OcpAEVxR3s9gS5bI6aFAg%3D&amp;reserved=0\"><span>https:\/\/aka.ms\/PSModuleFunctionExport<\/span><\/a><\/span><\/span><\/span><span><span><span>.<\/span><\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p>Addresses an issue that was introduced in the July 2018 .NET Framework update. Applications that rely on COM components were failing to load or run correctly because of \u201caccess denied,\u201d \u201cclass not registered,\u201d or \u201cinternal failure occurred for unknown reasons\u201d errors.<\/p>\n<\/li>\n<li>\n<p>Security updates to Windows Server.<\/p>\n<\/li>\n<\/ul>\n<\/blockquote>\n<p>\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306b\u306f\u3001\u7279\u5b9a\u306e\u30e1\u30c3\u30bb\u30fc\u30b8\u304c\u30ed\u30fc\u30ab\u30e9\u30a4\u30ba\u3055\u308c\u305f\u8a00\u8a9e\u3067\u306f\u306a\u304f\u3001\u82f1\u8a9e\u3067\u8868\u793a\u3055\u308c\u308b\u65e2\u77e5\u306e\u4e0d\u5177\u5408\u304c\u4e8c\u4ef6\u63b2\u8f09\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306f<a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4343897\">Microsoft Update Catalog<\/a>\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3059\u308b\u3053\u3068\u3082\u3067\u304d\u307e\u3059\u3002<\/p>\n<h2>KB4343885 (OS Build 15063.1266)<\/h2>\n<p>Version 1703\u7528\u306e\u7d2f\u7a4d\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343885\">KB4343885<\/a>\u3067\u306f\u3001Intel Core\/Xenon\u30d7\u30ed\u30bb\u30c3\u30b5\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u65b0\u3057\u3044\u6295\u6a5f\u7684\u5b9f\u884c\u30b5\u30a4\u30c9\u30c1\u30e3\u30f3\u30cd\u30eb\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b\u4fdd\u8b77\u306e\u63d0\u4f9b\u3084\u3001Internet Explorer\u306e\u52d5\u4f5c\u304c\u4e00\u90e8Web\u30b5\u30a4\u30c8\u3067\u505c\u6b62\u3059\u308b\u554f\u984c\u306e\u4fee\u6b63\u3001\u30c8\u30fc\u30af\u30f3\u30d0\u30a4\u30f3\u30c7\u30a3\u30f3\u30b0\u30d7\u30ed\u30c8\u30b3\u30ebv0.16\u306e\u30c9\u30e9\u30d5\u30c8\u7248\u306e\u30b5\u30dd\u30fc\u30c8\u3059\u308b\u305f\u3081\u306e\u66f4\u65b0\u306a\u3069\u304c\u884c\u308f\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<blockquote>\n<ul>\n<li>\n<p>Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\">CVE-2018-3620<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180018\">CVE-2018-3646<\/a>). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the <a href=\"https:\/\/apac01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&amp;data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&amp;sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&amp;reserved=0\" target=\"_blank\">Windows Client<\/a> guidance KB article.&nbsp;(<em>These registry settings are enabled by default for Windows Client OS editions.<\/em>)<\/p>\n<\/li>\n<li>Addresses an issue that causes Internet Explorer to stop working for certain websites.&nbsp;<\/li>\n<li>Updates support for the draft version of the Token Binding protocol v0.16.&nbsp;<\/li>\n<li>Addresses an issue that causes Device Guard to block some <strong>ieframe.dll<\/strong> class IDs after installing the May 2018 Cumulative Update.&nbsp;<\/li>\n<li>Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.<\/li>\n<li>\n<p><span><span><span><span>Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) <u>and<\/u> a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is&nbsp;\u201cThis module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement\u201d. For more information, see <\/span><\/span><\/span><span><span><span><a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8200&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=kSZ7s7nk9hHky\/03rwqdcaoAMJdwJwd%2BsltaI4ODW\/s%3D&amp;reserved=0\"><span>https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8200<\/span><\/a> <\/span><\/span><\/span><span><span><span>and <\/span><\/span><\/span><span><span><span><a href=\"https:\/\/na01.safelinks.protection.outlook.com\/?url=https:\/\/aka.ms\/PSModuleFunctionExport&amp;data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&amp;sdata=muUIr\/qbRp8\/%2B5fPfLzgY8OcpAEVxR3s9gS5bI6aFAg%3D&amp;reserved=0\"><span>https:\/\/aka.ms\/PSModuleFunctionExport<\/span><\/a><\/span><\/span><\/span><span><span><span>.<\/span><\/span><\/span><\/span><\/p>\n<\/li>\n<li>\n<p>Addresses an issue that was introduced in the July 2018 .NET Framework update. Applications that rely on COM components were failing to load or run correctly because of \u201caccess denied,\u201d \u201cclass not registered,\u201d or \u201cinternal failure occurred for unknown reasons\u201d errors.<\/p>\n<\/li>\n<li>Security updates to Windows Server.<\/li>\n<\/ul>\n<\/blockquote>\n<p>\u65e2\u77e5\u306e\u4e0d\u5177\u5408\u306f\u5b58\u5728\u305b\u305a\u3001\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306f<a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4343885\">Microsoft Update Catalog<\/a>\u304b\u3089\u5165\u624b\u3059\u308b\u3053\u3068\u3082\u53ef\u80fd\u3067\u3059\u3002<\/p>\n<p>\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u5185\u5bb9\u306f<a href=\"https:\/\/blogs.technet.microsoft.com\/jpsecurity\/2018\/08\/15\/201808-security-updates\/\">Microsoft\u306e\u30d6\u30ed\u30b0\u306a\u3069<\/a>\u304b\u3089\u53c2\u7167\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft\u306f\u672c\u65e5\u3001Windows 10 Version 1803(Windows 10 April 2018 Update)\u7528\u306e\u7d2f\u7a4d\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8KB4343909\u3092\u30ea\u30ea\u30fc\u30b9\u3057\u307e\u3057\u305f(Neowin)\u3002 \u6bce\u6708\u7b2c2\u706b\u66dc [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":62498,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"swell_btn_cv_data":"","footnotes":""},"categories":[3],"tags":[3298,2701],"class_list":["post-62497","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-windows","tag-windows","tag-windows10"],"_links":{"self":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/posts\/62497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/comments?post=62497"}],"version-history":[{"count":0,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/posts\/62497\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/media\/62498"}],"wp:attachment":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/media?parent=62497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/categories?post=62497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/tags?post=62497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}