• Patch Lady Posts – Master patch listing

    Home » Forums » Newsletter and Homepage topics » Patch Lady Posts – Master patch listing


    I, Susan Bradley, do solemnly swear that I will, to the best of my human abilities, to track, maintain, opine and list the updates that Microsoft rele
    [See the full post at: Patch Lady Posts – Master patch listing]

    Susan Bradley Patch Lady/Prudent patcher

    Total of 24 users thanked author for this post. Here are last 20 listed.
    Viewing 10 reply threads
    • #171006


      Thank you.

      1 user thanked author for this post.
    • #171013

      I have been posting direct download links to the MS Catalog for Windows Security-only Updates and IE11 CUs (Win7/8.1 for Group B) every month on AKB2000003 in the Knowledge Base. Please feel free to refer to that if it makes it easier for you

    • #171024

      After 7 runs out maybe  Steve Gibson will keep us tuned up a little longer like he did with XP.

      1 user thanked author for this post.
    • #171033

      “I, Susan Bradley, do solemnly swear that I will, to the best of my human abilities, to track, maintain, opine and list the updates that Microsoft releases to you and your beloved systems.”

      Which beats the alternative hands-down: Microsoft-Complaint-Department



      8 users thanked author for this post.
    • #171036

      This is an Excellent resource!

      Could I make a suggestion of formatting. The centre (vertical) justification makes it difficult to visually process the longer posts.

      Maybe start all the sections top justified?

    • #171038

      Format works for me.  Thanks, Susan.

      iPhone 13, 2019 iMac(SSD)

    • #171057

      Thanks, Susan! How nifty is that?

    • #171096

      The list is a good idea as long as it is kept up. The listing for KB4074598 is out of date:

      the list says “2/13/18               kB4074598    Windows 7  Ok to Install

      Given the latest information on this update  with the SCARD_E_NO_Service bug, I do not think that I would install this one.  The last line in the KB article says Microsoft is working on a resolution and will provide an update in an upcoming release”  I think I’ll wait for the upcoming release before doing anything.  Perhaps the list could be updated just before Wood changes the MS-defcon rating that way it would include the most up to date information.

      Edit to remove HTML from cut/paste. Please convert to plain text prior to cut/paste.

      1 user thanked author for this post.
      • #171103


        This. Why would anyone install a defective Security Only patch. Microsoft as malware    🙁

        Would be nice to have the Security Only updates for .Net listed as well…, although not even these may be safe anymore.

        Barring lightning strikes, next drama for me is likely May – August when Firefox ESR goes Quantum. Noscript user but other add-ons won’t work or be replaced. All the Kaspersky Internet Security tools may not work either. 🙁

        Better renew my HP Care Pack business support shortly… UGH!!!

      • #171137

        You have smart card on that Windows 7?  The known issue only is if the 7 has smart cards used for logins.  I’ve not seen this widely reported.

        “smart card-based operations fail with error “SCARD_E_NO_SERVICE”

        EDIT: html to text, post may not appear as intended

        1 user thanked author for this post.
    • #171107

      A kind reminder that the clock is ticking on your beloved platform, you have two years before Windows 7 will be out of support in January of 2020.  So we have time to review our options and what to do after that platform drops out of patching support.

      Well, about that… many people have already taken the decision to drop out of the patching mess that microsoft have created themselves (it’s called group “W”). The monthly update saga has become too much like playing russian roulette so i would wager that as long as safe browsing is followed then a lot more of us will carry on using our trusty old 7 machines for a while longer.

      1 user thanked author for this post.
      • #171110

        There is no such thing as “safe browsing”.  I have seen malicious-ness on just about anything.

        Susan Bradley Patch Lady/Prudent patcher

        6 users thanked author for this post.
        • #171113

          True, but now there’s also no such thing as safe Microsoft patching either, which leaves users with a choice of potentially bricking their computer or trying to minimise the risks online. It never used to be like this.

          Windows 10 Home 22H2, Acer Aspire TC-1660 desktop + LibreOffice, non-techie

          6 users thanked author for this post.
          • #171119

            This. Microsoft have proven time and time again they cannot be trusted, especially now they are relying on their customers to be their beta testers after culling their own testers. Maybe there isn’t 100% safe browsing but there is a heck of a lot you can do to reduce your attack surface, even if you take the nuclear option and run something like noscript, which i admit isn’t suitable for your ordinary user. It’s just i’ve seen many a comment on here of people who have abandoned windows updates for a while now (possibly since they started lumping them all together) and nothing of value is lost.

            • #171122

              It’s just i’ve seen many a comment on here of people who have abandoned windows updates for a while now (possibly since they started lumping them all together) and nothing of value is lost.”

              I’m wincing at that comment.  Every unpatched machine means there’s a toe-hold that a bad guy can get into.   One has to balance the risk of updating with the risk of n0t-updating.  But turn off updating completely, I obviously have my work cut out for me to showcase that when managed, and done when it’s on your schedule, we can find a happy medium.

              Susan Bradley Patch Lady/Prudent patcher

              6 users thanked author for this post.
            • #171134

              Yes, but you have to understand that for many people the adversary here is microsoft. Lest we forget that the gwx campaign was malware, pure and simple malware pushed through seemingly harmless updates. There was a time i would update within days of them being pushed out but no longer and i lay the blame entirely at microsoft’s door, this is of their own making because they can no longer be trusted, i just cannot stress that enough. I agree with a happy medium of updating, i am in group “B” myself, but unless you take steps that the average user is incapable of then updating on 10 is not to your schedule but microsoft’s. Every time i visit this site it makes me glad i’m not using 10 when i read the latest horror show of an update breaking usb ports or ethernet or bluetooth or printers or etc.

              Can some others chime in on their group “W” approach here? I know you’re on here and are managing perfectly well without the risk of microsoft bricking your machines due to another botched update.

              6 users thanked author for this post.
            • #171151

              I used to actually look forward to Patch Tuesday. My attitude back then was, “Oh goody! Microsoft is fixing the flaws in Windows. Let’s take care of them!”

              Over the last couple of years, though, Windows patching has become a white-knuckle experience where I have no confidence that the updates will install or that my  computers will even still work at the end of the process.

              So now I wait until Woody gives the green light, and even for weeks afterward for good measure. Group B here. My systems are well protected with multiple layers of defense, so I’m not worried that I’ll fall victim to whatever vulnerability the patches fix while I wait, and I have little doubt that they will remain amply protected if and when I make the switch to Group W.

              All that said, when Windows 7 goes EOS the best protection that I anticipate enjoying is my move to Group L (for Linux), a transition which is underway and will be complete well before 2020.


              4 users thanked author for this post.
            • #171136

              The key to Windows 10 is to be on Pro and only install feature releases when the dust settles (aka how Enterprise are doing this).  They are back on 1703 going… what issues?

              1 user thanked author for this post.
            • #171175

              Last one I saw (who bothered with 10) was on 1507 LTSB with updates, firewall, and antivirus disabled. This was less than 30 days ago.

            • #171969

              just 2c –
              when EOS comes (again force by ‘them’ on the ‘users’)
              for those who still wish to continue with W7
              will automatically be grp W right?
              see we are ONE BIG WORLD after all 🙂
              some of us just have a headstart
              practising alternative methods and ‘safer’ browsing/computer behavior 😛
              ‘safer’ browsing start from ‘thou shall not trust anything on the net’
              and ‘do not lightly click anything that blinks and pop up’ and on…
              Noel (and many here) has a v.good self-protection monitoring system and good clean computing habits

              or just move to grp L and set yourself FREE 🙂

              back to fishing for better dreams

            • #171171

              I’m thinking that a lot of people aren’t feeling the love from Microsoft. I know I’m not. I can remember they were doing this rollup updating to make everyone so secure (thats what they said, right?)… and they have botched it terribly. I want to be updated. I’ve been updating with Woody’s Defcon method, Group B, faithfully, and it keeps me out of problems… but I didn’t update when the all clear was given for January, and I’m still holding my breath. There are just too many big problems, and too many variables. Much as I read about January patches, I wasn’t sure my Sandy Bridge processor wouldn’t have problems. I had anxiety about updating, and anxiety about not updating. I made an full image backup… and I’m waiting for things to get better… but they aren’t really better this month. Maybe my system would be just fine… but right now, I’m not going to risk it. I get overwhelmed going through the details of what is and is not affected… and I feel like I don’t know enough to make a safe decision. I have the backups, but I’ve never had to restore my system, and I don’t really want to, despite the fact that I’ve done clean installs of other people’s systems (that had been ruined by W10 and/or its updating). Something about it being mine… and I’m really attached to how it is set up and working for me now.

              Microsoft broke my trust by pushing an operating system that can’t opt out of telemetry, that is designed to be chronically unstable and pushes the home user into acting as a beta tester… and then it wants to s***w up my older, well behaving OS… No Way!

              If I remember right, there are at least two parts to the Meltdown/Spector patches… only one part is the OS patch… I have an older processor, and the OEM doesn’t have patch for it, yet… and it takes both parts for the patching to be effective. I’ll be hornswaggled if I’m going to put a Meltdown/Spector patch on my OS before the firmware patch is offered and thoroughly tested by others. That bios patch doesn’t even have an estimate, yet, as to when it will be available… and it looks like March will be the soonest… When they are both up and working well, I’ll be glad to update… otherwise this looks like a rush to appear like it is being fixed (Microsoft rushes out very problematic patches), without actually fixing the problem. If I’m wrong about this, please correct me, but it needs to be specific info, not just ‘should’ do it now.

              If there was more information about what the patches actually did, and I could pick and choose with greater detail and knowledge, I would go ahead… I’m not actually choosing Group W, except as a temporary thing… I really appreciate those that willingly try the patches… and report back the results, good and bad…

              Some reassurance? Handholding? I don’t know what you can do, when things appear to be getting worse, rather than better. Maybe they aren’t worse, and I’m just a non-techy wimp… If there was a clear path that I felt safe to take, I’d be updated already.

              Non-techy Win 10 Pro and Linux Mint experimenter

              5 users thanked author for this post.
            • #171192

              Elly, my Win7 machine has Sandy Bridge and I updated the January patches after doing images for both our computers, Win7 and Win8.1 – both in Group B ……… so that meant the Security and IE Patches….and so far so good……… just thought to let you know. If you remember also I wasn’t able to install the July patch I think it was – it bricked my Win7 machine and I had to uninstall via safe mode…… and although I meant to try again after the next months patches (Aug) situations in the real world side tracked me and I didn’t at the time….. Know this probably sounds bizarre and some would roll their eyes……….. but there you go….. seems ok for now….. but should something happen …. well it will make me leap over to a MacbookPro tout suit! There is so much that one can take …. and well the real world has shown me that we don’t need all this mayhem that’s been created by MS and other players. Life is too short! We need Peace, Love and Team work, and I for one am so grateful to have people like Woody, Susan, PK Cano et al around to show us the way! LT

              “No matter what people tell you – Words and Ideas can change the world” Robin Williams

              2 users thanked author for this post.
            • #171204


              Thank you for the positive report on your Sandy Bridge making it through January patches okay. I do remember you having problems with the July patch… but it didn’t give me any problems, and I couldn’t say what the difference was.

              Looking at moving to Win 8.1 at end of life for Win 7… can’t afford a Mac… and I’m entrigued by, and exploring open source OS and programs (Linux Mint being the easiest for me right now) as a longer term solution. Trying to explore and get comfortable before I have to make a change.

              I, too, am grateful for all the really good people here, helping me along the way.


              Non-techy Win 10 Pro and Linux Mint experimenter

              1 user thanked author for this post.
    • #171125

      I appreciate the promotion to permanent link in the headliner banner, easy to find without search and still findable if you do search.

      I like having the variety of information available to take in. My only concern is there appears to be no room left on the banner. Exhausting the limits already. You have built something impressive here.

      1 user thanked author for this post.
    • #171273


      The Master Patch List you posted is blank. All I see are the column headers (Day/Month released, Patch Knowledge Base Article, etc.). The rest of the post below is white space.

      If I click on the link to the previous month’s patch list (2018-02), the patch list displays properly.

      Edit to remove HTML

    Viewing 10 reply threads
    Reply To: Patch Lady Posts – Master patch listing

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: