Patch Repository

Windows Server 2016 Hyper-V Edition (x64) Patch Details
Patch Name Windows10.0-kb4100347-v4-x64-1803-2016.msu
Patch Description 2018-10 Update for Windows Server 2016 (1803) for x64-based Systems (KB4100347)
Bulletin Id MSWU-2906
Bulletin Title 2018-05 Update for Windows 10 Version 1803 based Systems (KB4100347)
Severity Unrated
Location Path Windows10.0-kb4100347-v4-x64-1803-2016.msu
Bulletin Summary Intel recently announced that they have completed their validations and started to release microcode for recent CPU platforms related to Spectre Variant 2 (CVE 2017-5715 [“Branch Target Injection�]). This update includes microcode updates from Intel for the following CPUs:
Superceding Bulletin Id MSWU-3161
Patch Release Date Jan 8, 2019

Affected Product Information

Product Name Service Pack Name
Windows Server 2016 Datacenter Edition (x64)Windows Server 2016 Gold (x64)
Windows Server 2016 Standard Edition (x64)Windows Server 2016 Gold (x64)
Windows Server 2016 Essentials Edition (x64)Windows Server 2016 Gold (x64)
Windows 10 Version 1803 (x64)Windows 10 Version 1803 (x64)
Windows Server 2016 Standard A Core Edition (x64)Windows Server 2016 Gold (x64)
Windows Server 2016 Server Standard (evaluation installation) Edition (x64)Windows Server 2016 Gold (x64)
Windows Server 2016 Storage Server Workgroup Edition (x64)Windows Server 2016 Gold (x64)
Windows Server 2016 Hyper-V Edition (x64)Windows Server 2016 Gold (x64)
Windows Server 2016 Datacenter (evaluation installation) Edition (x64)Windows Server 2016 Gold (x64)
Windows Server 2016 Storage Server Standard Edition (x64)Windows Server 2016 Gold (x64)
Windows Server 2016 Standard Semi-Annual Channel (core installation) Edition (x64)Windows Server 2016 Gold (x64)

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.