Patchday: Windows 11/Server 2022-Updates (July 11, 2023)

Windows[German]On July 11, 2023 (second Tuesday of the month, Microsoft patch day), Microsoft also released cumulative updates for Windows 11 22H1 and 22H2. In addition, Windows Server 2022 received an update. Here are some details about these updates, which are supposed to fix vulnerabilities as well as problems.


Advertising

Updates for Windows 11 21H1 – 22H2

A list of Windows 11 updates can be found on this Microsoft website. I have pulled out the details below. Microsoft now provides the following updates for the Windows 11 versions mentioned above.

Update KB5028185 for Windows 11 22H2

Cumulative Update KB5028185 raises the OS build for Windows 11 to 22621.1992 and includes quality improvements as well as security patches. In this update, the new features mentioned in the previous month's preview update are also applied (see Windows 10 22H2 Preview Update KB5027293 – (June 27 2023)). In the support article, Microsoft states the following:

This update makes miscellaneous security improvements to internal OS functionality. No additional issues were documented for this release.

Furthermore, the support article KB5028185 lists a number of improvements that I have not pulled out here. This update is automatically downloaded and installed by Windows Update, but is also available from the Microsoft Update Catalog and via WSUS and WUfB. The patch includes the Windows 11 Servicing Stack Update. Issues caused by the update are listed in the support post.

Update KB5028182 for Windows 11 21H2

Cumulative Update KB5028182 raises the OS build on Windows 11 to 22000.2176 and includes quality improvements and security patches, but no new operating system features. The fixes from the previous month's preview update have been incorporated (see Windows 11 21H2: Preview-Update KB5027292 (June 28, 2023)). Regarding the implemented improvements, Microsoft mentions the following:

  • This update makes miscellaneous security improvements to internal OS functionality. No additional issues were documented for this release.

Microsoft notes that this update makes quality improvements to the servicing stack (which is responsible for Microsoft updates). This update is automatically downloaded and installed by Windows Update, but is also available from the Microsoft Update Catalog and via WSUS and WUfB. Notes on known issues with the update can be found in the support article.

Windows Server 2022

According to this Microsoft page, cumulative update KB5028171 (Windows Server 2022) has been released for Windows Server 2022, raising the OS build to 20348.1850. Among the fixes this update makes, Microsoft writes:


Advertising

  • New! This update improves several simplified Chinese fonts and the Microsoft Pinyin Input Method Editor (IME). They now support GB18030-2022. Characters in the Standard Chinese Characters List (GB18030-2022 implementation level 2) are available in Microsoft Yahei (regular, light, and bold), Dengxian (optional font: regular, light, and bold), and Simsun. The Simsun Ext-B font (GB18030-2022 implementation level 3) now supports Unicode CJK Unified Ideographs Extensions E and F.
  • New! This update removes Simplified Chinese handwriting recognition from Windows Server 2022. This is because conformant handwriting recognition is not available for Windows Server. Updated media will have this change. To update existing images, use the DISM tool to remove the Simplified Chinese Handwriting capability.
  • This update addresses an issue that affects console applications. They fail when you set the system locale to Japanese.
  • This update addresses an issue that affects the Notepad combo box in Settings. It fails to show all the available options.
  • This update addresses a race condition. It occurs when codepages load during early startup. This might cause a 0x7e stop error.
  • This update addresses an issue that affects Microsoft Edge IE mode. The text on the status bar is not always visible.
  • This update addresses an issue that affects the Microsoft HTML Application Host (HTA). This issue blocks code execution that uses Microsoft HTA. This occurs when you turn on Windows Defender Application Control (WDAC) User Mode Code Integrity (UMCI) enforced mode.
  • The update addresses a random issue that affects svchost.exe. There is significant memory growth in a system. This occurs when svchost.exe contains the User Access Logging Service (UALSVC).
  • This update addresses an issue that affects all the registry settings under the Policies paths. They might be deleted. This occurs when you do not rename the local temporary user policy file during Group Policy processing.
  • This update addresses an issue that affects dot sourcing. It fails for files that contain a class definition in Windows PowerShell.
  • This update addresses an issue that affects .msi files. A minor update is not installed. This occurs when you use the EnterpriseDesktopAppManagement configuration service provider (CSP) to distribute the .msi file.
  • This update addresses an issue that affects msftconnecttext.net. It gets excessive HTTP traffic.
  • This update addresses an issue that affects the Spooler service. It stops working. This issue occurs when you print using a certain workspace.
  • The update addresses an intermittent issue that affects an audio stream. The issue disrupts the stream.
  • This update addresses an issue that affects NCryptGetProperty(). When you call it with NCRYPT_KEY_TYPE_PROPERTY, the system returns 0x1 instead of 0x20. This occurs when the key is a machine key.
  • This update addresses an issue that affects a tib.sys driver. It does not load. This occurs when HyperVisor-protected Code Integrity (HVCI) is enabled.
  • This update addresses an issue that affects HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders. You can now set and maintain the correct default permissions for this directory path. When the permissions are wrong, the Start menu, search, and Azure Active Directory (Azure AD) authentication fail.
  • This update addresses an issue that affects Active Directory Users & Computers. It stops responding. This occurs when you use TaskPad view to enable or disable many objects at the same time.
  • This update addresses an issue that affects File Explorer. It might stop responding indefinitely. This occurs after you try to view the effective access permissions for files in File Explorer.
  • This update addresses an issue that affects Live Migration. It might fail in a stretch cluster deployment. This occurs because the Storage Replica fails to retry after it receives a retry error from the Cluster API.
  • This update addresses an issue that affects cluster name object of failover clustering. You cannot repair it on Azure Virtual Machines.
  • This update addresses an issue that affects Remote Server Administration Tools (RSAT). In the Standard edition, Network Controller Management Tools is missing from the RSAT dialog.

Microsoft weist darauf hin, dass dieses Update Qualitätsverbesserungen am Servicing Stack (der ist für Microsoft Updates verantwortlich) durchführt. Dieses Update wird automatisch von Windows Update heruntergeladen und installiert, ist aber auch im Microsoft Update Catalog und per WSUS sowie WUfB erhältlich. Hinweise auf bekannte Probleme mit dem Update finden sich im Supportbeitrag. Microsoft Update Catalog and via WSUS and WUfB. Notes on known issues with the update can be found in the support article.

Similar articles:
Microsoft Security Update Summary (July 11, 2023)
Patchday: Windows 10-Updates (July 11, 2023)
Patchday: Windows 11/Server 2022-Updates (July 11, 2023)
Windows 7/Server 2008 R2; Server 2012 R2: Updates (July 11, 2023)


Advertising

This entry was posted in Security, Update, Windows and tagged , , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: Please note the rules for commenting on the blog (first comments and linked posts end up in moderation, I release them every few hours, I rigorously delete SEO posts/SPAM).