![]() ![]() This document will be updated when additional updated builds are available. Available SQL PatchesĪt the time of publication, the following updated SQL Server builds are available for download:Ĥ057122 Description of the security update for SQL Server 2017 GDR: January 3, 2018Ĥ058562 Description of the security update for SQL Server 2017 RTM CU3: January 3, 2018Ĥ058561 Description of the security update for SQL Server 2016 SP1 CU7: January 3, 2018Ĥ057118 Description of the security update for SQL Server 2016 GDR SP1: January 3, 2018Ĥ058559 Description of the security update for SQL Server 2016 CU: January 6, 2018Ĥ058560 Description of the security update for SQL Server 2016 GDR: January 6, 2018Ĥ057117 Description of the security update for SQL Server 2014 SP2 CU10: January 16, 2018Ĥ057120 Description of the security update for SQL Server 2014 SP2 GDR: January 16, 2018Ĥ057116 Description of the security update for SQL Server 2012 SP4 GDR: January 12, 2018Ĥ057115 Description of the security update for SQL Server 2012 SP3 GDR: January, 2018Ĥ057121 Description of the security update for SQL Server 2012 SP3 CU: January, 2018Ĥ057114 Description of the security update for SQL Server 2008 SP4 GDR: January 6, 2018Ĥ057113 Description of the security update for SQL Server 2008 R2 SP3 GDR: January 6, 2018 Note: This update will not be downloaded and installed automatically via Windows Update. This update is also available through Windows Server Update Services (WSUS), or the Microsoft Update Catalog website. ![]() Please note that this advisory only applies to Intel Processors. You can find guidance for environments affected by ADV190013 in the Recommendations section of this article. SQL Server does not have any specific security patches for the issue described in ADV190013. Microsoft published ADV190013 - Microsoft Guidance to Mitigate Microarchitectural Data Sampling Vulnerabilities in May 2019. For general guidance to mitigate this class of vulnerability, see Guidance for mitigating speculative execution side-channel vulnerabilities This includes microcode from device OEMs and, in some cases, updates to antivirus software.įor more information about the vulnerabilities, see Microsoft Security Advisory ADV180002. To get all available protections, hardware or firmware and software updates are required. Microsoft continues to work closely together with industry partners, including chip makers, hardware OEMs, and application vendors, to protect customers. ![]() Microsoft has not received any information to indicate that these vulnerabilities have been used to attack customers at this time. See the following sections for more information. ![]() We have also taken action to secure our cloud services. Microsoft has released several updates to help mitigate these vulnerabilities. Therefore, we advise customers to seek guidance from those vendors. Note This issue also affects other systems, such as Android, Chrome, iOS, and MacOS. Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern processors and operating systems. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |