Jump to content
  • Microsoft makes potentially-breaking Windows kernel patch default after an earlier warning


    Karlston

    • 650 views
    • 2 minutes
     Share


    • 650 views
    • 2 minutes

    Microsoft, earlier this week, released its August Patch Tuesday updates for Windows 10 (KB5029244) and Windows 11 (KB5029263/KB5029253) and also Servers. The one for 10 finally fixed an Intel DirectX issue on an older Windows 10 version.

     

    Aside from Windows, Microsoft also rolled out Office security updates for Outlook, Excel, Word, and more, which fix issues like spoofing and remote code execution (RCE). So you should probably update if you haven't already (find the download links here).

     

    Speaking of security updates, this month's Patch enables a kernel security vulnerability fix by default, something Microsoft had cautioned back in June that it could potentially break something on your system, though it didn't really go into much detail about it. The support page for the issue has been updated with the following message now:

     

    IMPORTANT The resolution described in this article introduces a potential breaking change. Therefore, we are releasing the change disabled by default with the option to enable it. We recommend that you validate this resolution in your environment. Then, as soon as it is validated, enable the resolution as soon as possible.

     

    NOTE The resolution described in this article has now been released enabled by default.

     

    [...]

     

    IMPORTANT The resolution described in this article has been released enabled by default. To apply the enabled by default resolution, install the Windows update that is dated on or after August 8, 2023. No further user action is required.

     

    Here is a summary of the vulnerability as provided by Microsoft. The flaw, a Windows kernel information disclosure vulnerability is tracked under ID "CVE-2023-32019":

     

    Summary

     

    An authenticated user (attacker) could cause an information disclosure vulnerability in Windows Kernel. This vulnerability does not require administrator or other elevated privileges.

     

    The attacker who successfully exploits this vulnerability could view heap memory from a privileged process that is running on the server.

     

    Successful exploitation of this vulnerability requires an attacker to coordinate the attack with another privileged process that is run by another user in the system.

     

    You can find the support document on Microsoft's site under KB5028407.

     

    Source


    User Feedback

    Recommended Comments

    There are no comments to display.



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...