<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;
font-family:"Calibri",sans-serif;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style>
</head>
<body lang="EN-US" link="#0563C1" vlink="#954F72" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">Content in the Patches for Windows site has been modified<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Modified:<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">* Minor [ID:407269810] 4072698: Enable mitigations for Intel TSX Transaction Asynchronous Abort vulnerability (CVE-2019-11135) and Microarchitectural Data Sampling ( CVE-2019-11091, 12126, 12127, 12130 ) - With HyperThreading - Windows
Server Operating Systems<o:p></o:p></p>
<p class="MsoNormal">* Minor [ID:407269805] 4072698: Enable mitigations to help protect against CVE 2018-3639, CVE-2017-5715, CVE-2017-5754 , CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130 - Windows Server 2008 / 2008 R2 / 2012 / 2012 R2 /
Windows 2016/Windows 2019<o:p></o:p></p>
<p class="MsoNormal">* Minor [ID:407311911] 4073119: Enable Additional Hyper-V Protections against speculative execution side-channel vulnerabilities - Windows Client Operating Systems with Hyper-V<o:p></o:p></p>
<p class="MsoNormal">* Major [ID:500192101] 5001921: Update for Outlook 2016 - Outlook 2016 - KB5001921 (x64) (Superseded)<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Reason for Update:<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">* CVE ID has been updated<o:p></o:p></p>
<p class="MsoNormal">* Old update has been superseded<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Actions to Take:<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">* None<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Published site version:<o:p></o:p></p>
<p class="MsoNormal">Site Name: Patches for Windows<o:p></o:p></p>
<p class="MsoNormal">Version: 4024<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Additional links:<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">Application Engineering Team<o:p></o:p></p>
<p class="MsoNormal">HCL BigFix<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
</div>
</body>
</html>