Windows 10 April 2019 Cumulative Updates Released With Fixes

Windows Update

Today is second Tuesday of the month and the new cumulative updates are rolling out for supported versions of Windows 10, including the October 2018 Update, the April 2018 Update and the Fall Creators Update. Microsoft has also released a cumulative update for devices running the Insider preview builds of the upcoming Windows 10 May 2019 Update.

The April 2019 patches for all versions of Windows include security or non-security fixes and improvements.

As always, you can open Settings via Start menu and navigate to Update & Security -> Windows Update and select Check for updates to install the latest patch. If you own multiple PCs or if you would like to patch the PCs manually, you can download and install this update from here.

TOP ARTICLES1/5READ MOREWindows 10 April 2019 Cumulative Updates Released With Fixes

Build 18362.53 for Windows 10 May 2019 Update

Microsoft is rolling out new a cumulative update to devices enrolled into the Slow, Fast and Release Preview rings. If you have updated to Windows 10 May 2019 Update Build 18356.30, you will receive a new update today that will advance the system to Build 18362.53.

Microsoft says this update also includes security updates that come as part of the normal monthly cumulative updates.

Build 17763.437 for October 2018 Update

Build 17763.437 for Windows 10 October 2018 Update devices addresses the general security and non-issues with core apps and programs. However, all the changes are aimed at enterprises and there’s nothing in the basket for consumers. Here’s the full changelog of the patch:

  • Addresses an issue that occurs when you enable per font end-user-defined characters (EUDC). The system will stop working and a blue screen will appear at startup. This is not a common setting in non-Asian regions.
  • Addresses an issue that may cause applications that use MSXML6 to stop responding if an exception was thrown during node operations.
  • Addresses an issue that causes the Group Policy editor to stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 Internet settings.
  • Addresses an issue that may cause authentication issues for Internet Explorer 11 and other applications that use WININET.DLL. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server machine, including Remote Desktop Protocol (RDP) and Terminal Server logons.
  • Security updates to Windows Datacenter Networking, Windows Server, the Microsoft JET Database Engine, Windows Kernel, Windows Input and Composition, Microsoft Scripting Engine, Windows App Platform and Frameworks, Windows Storage and Filesystems, Microsoft Graphics Component, Windows Virtualization, Windows MSXML, Windows SQL components, and Microsoft Edge.

Known issues in this update


Symptom Workaround
After installing this update, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer. Right-click the URL link to open it in a new window or tab.

Or

Enable Protected Mode in Internet Explorer for local intranet and trusted sites.

  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.

You must restart the browser after making these changes.

Microsoft is working on a resolution and will provide an update in an upcoming release.

After installing this update, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

Option 2:
Use the Windows Deployment Services UI.

  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0:

“HKLM\System\CurrentControlSet\Services\WDSServer\Providers\WDSTFTP\EnableVariableWindowExtension”.

Restart the WDSServer service after disabling the Variable Window Extension.

Microsoft is working on a resolution and will provide an update in an upcoming release.

Build 17134.706 for April 2018 Update

Build 17134.706 for April 2018 Update also comes with changes aimed at businesses. Here’s the full changelog:

  • Provides protections against Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754) for VIA-based computers. These protections are enabled by default for the Windows Client, but disabled by default for Windows Server. For Windows Client (IT Pro) guidance, follow the instructions in KB4073119. For Windows Server guidance, follow the instructions in KB4072698. Use these guidance documents to enable or disable these mitigations for VIA-based computers.
  • Addresses a stop error that occurs when attempting to start the Secure Shell (SSH) client program from Windows Subsystem for Linux (WSL) with agent forwarding enabled using a command line switch (ssh –A) or a configuration setting.
  • Addresses an issue that may cause applications that use MSXML6 to stop responding if an exception was thrown during node operations.
  • Addresses an issue that causes the Group Policy editor to stop responding when editing a Group Policy Object (GPO) that contains Group Policy Preferences (GPP) for Internet Explorer 10 Internet settings.
  • Addresses an issue that occurs when you enable per font end-user-defined characters (EUDC). The system will stop working and a blue screen will appear at startup. This is not a common setting in non-Asian regions.
  • Security updates to Microsoft Scripting Engine, Windows App Platform and Frameworks, Windows Storage and Filesystems, Windows Server, Windows Graphics, Windows Input and Composition, Windows Kernel, Windows Virtualization, Windows MSXML, and the Microsoft JET Database Engine.

Known issues in this update


Symptom Workaround
After installing this update, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer. Right-click the URL link to open it in a new window or tab.

Or

Enable Protected Mode in Internet Explorer for local intranet and trusted sites.

  1. Go to Tools > Internet options > Security.
  2. Within Select a zone to view or change security settings, select Local intranet and then select Enable Protected Mode.
  3. Select Trusted sites and then select Enable Protected Mode.
  4. Select OK.

You must restart the browser after making these changes.

Microsoft is working on a resolution and will provide an update in an upcoming release.

After installing this update, there may be issues using the Preboot Execution Environment (PXE) to start a device from a Windows Deployment Services (WDS) server configured to use Variable Window Extension. This may cause the connection to the WDS server to terminate prematurely while downloading the image. This issue does not affect clients or devices that are not using Variable Window Extension. To mitigate the issue, disable the Variable Window Extension on WDS server using one of the following options:

Option 1:
Open an Administrator Command prompt and type the following:

Wdsutil /Set-TransportServer /EnableTftpVariableWindowExtension:No

Option 2:
Use the Windows Deployment Services UI.

  1. Open Windows Deployment Services from Windows Administrative Tools.
  2. Expand Servers and right-click a WDS server.
  3. Open its properties and clear the Enable Variable Window Extension box on the TFTP tab.

Option 3:
Set the following registry value to 0:

“HKLM\System\CurrentControlSet\Services\WDSServer\Providers\WDSTFTP\EnableVariableWindowExtension”.

Restart the WDSServer service after disabling the Variable Window Extension.

Microsoft is working on a resolution and will provide an update in an upcoming release.

Microsoft ends support for Windows 10 Fall Creators Update

April 9 also marks the end of support Windows 10 Fall Creators Update (Pro and Home). That means Windows 10 Fall Creators Update is also receiving its last security updates today and if you are still running it, you should upgrade your device to a newer version to continue receiving the monthly cumulative updates.

[“source=bleepingcomputer”]