{"id":22888,"date":"2022-01-12T00:52:43","date_gmt":"2022-01-11T23:52:43","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=22888"},"modified":"2022-01-13T04:24:37","modified_gmt":"2022-01-13T03:24:37","slug":"patchday-windows-8-1-server-2012-r2-updates-11-januar-2022-mgliche-boot-probleme","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/01\/12\/patchday-windows-8-1-server-2012-r2-updates-11-januar-2022-mgliche-boot-probleme\/","title":{"rendered":"Patchday: Windows 8.1\/Server 2012 R2 Updates (January 11, 2022), boot loop reported"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/01\/12\/patchday-windows-8-1-server-2012-r2-updates-11-januar-2022-mgliche-boot-probleme\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]As of January 11, 2022, Microsoft has released various updates for Windows 8.1. These security updates are also available for Windows Server 2012 R2. I have already received information from a blog reader that a boot loop has occurred with domain controllers. Here is some information on the Monthly Rollup and Security only updates for this operating system.<\/p>\n<p><!--more--><\/p>\n<h2>Updates for Windows 8.1 and Windows Server 2012 R2<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg09.met.vgwort.de\/na\/6321e419b9f345ebb0e46df53e9b870b\" alt=\"\" width=\"1\" height=\"1\" \/>A rollup and security-only update have been released for Windows 8.1 and Windows Server 2012 R2. The update history for Windows 8.1 and Windows Server 2012 R2 can be found on <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4009470\/windows-8-1-windows-server-2012-r2-update-history\" target=\"_blank\" rel=\"noopener\">this Microsoft page<\/a>.<\/p>\n<h3>KB5009624 (Monthly Rollup) for Windows 8.1\/Server 2012 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/help\/5009624\" target=\"_blank\" rel=\"noopener\">KB5009624<\/a> (Monthly Rollup for Windows 8.1 and Windows Server 2012 R2) contains improvements and fixes, and addresses the following.<\/p>\n<blockquote><p>Addresses a Windows Server issue in which Active Directory attributes are not written correctly during a Lightweight Directory Access Protocol (LDAP) modify operation with multiple specific attribute changes.<\/p><\/blockquote>\n<p>This update is automatically downloaded and installed by Windows Update, but is also available from the <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB5009624\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> and via WSUS. If installing manually, the latest Servicing Stack Update (SSU <a href=\"https:\/\/support.microsoft.com\/help\/5001403\" target=\"_blank\" rel=\"noopener\">KB5001403<\/a>) must be installed beforehand &#8211; although this SSU cannot be uninstalled.<\/p>\n<p>Microsoft is aware of the following issue related to the update: Certain operations, such as renaming, that you perform for files or folders on a Cluster Shared Volume (CSV) may fail with the error \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\". This occurs when you perform the operation on a CSV owner node from a process that does not have administrator privileges. The KB article suggests a workaround to fix this. Details can be found in the KB article.<\/p>\n<h3>KB5009595 (Security-only update) for Windows 8.1\/Server 2012 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/help\/5009595\" target=\"_blank\" rel=\"noopener\">KB5009595<\/a> (Security Only Quality Update for Windows 8.1 and Windows Server 2012 R2) addresses the same issues as update <a href=\"https:\/\/support.microsoft.com\/help\/5009624\" target=\"_blank\" rel=\"noopener\">KB5009624<\/a>. The update is distributed via WSUS (but not via Windows Update) or is available from the <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=kb5009595\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. In case of a manual installation, the latest Servicing Stack Update (SSU) <a href=\"https:\/\/support.microsoft.com\/help\/5001403\" target=\"_blank\" rel=\"noopener\">KB5001403<\/a> must be installed beforehand. In addition, the Internet Explorer 11 security update <a href=\"https:\/\/support.microsoft.com\/help\/5006671\" target=\"_blank\" rel=\"noopener\">KB5006671<\/a> from Oct. 2021 (if not already available) should be installed.<\/p>\n<h3>Boot loop on DCs reported<\/h3>\n<p>German blog reader John L. contacted me via email a few hours ago about issues with the Jan 2022 update in conjunction with Windows Server 2012 R2. In his case, 2 domain controllers went into a boot loop because LSASS.exe throws an error 0xc0000005 (access violation). Here is his advice (thanks for that &#8211; I've translated his German text).<\/p>\n<blockquote><p>Hello G\u00fcnter,<\/p>\n<p>if you get several messages (as mine one) that 2012R2 is stuck in a bootloop loop after the patchday, this could possibly be due to the fact that after installing the KB's from today (no idea which one yet) LSASS.EXE crashes with 0xc0000005.<\/p>\n<p>\"\"Name of the corrupted application: lsass.exe, version: 6.3.9600.17415, timestamp: 0x545042fe<br \/>\nName of the corrupt module: msv1_0.DLL, version: 6.3.9600.20239, timestamp: 0x61c1a5c8<br \/>\nException Code: 0xc0000005<br \/>\nFehleroffset: 0x0000000000002663<br \/>\nID of the faulty process: 0x1f4<br \/>\nStart time of the faulty application: 0x01d8072ac5b2c15a<br \/>\nPath of the faulty application: C:\\Windows\\system32\\lsass.exe<br \/>\nPath of the corrupted module: C:\\Windows\\system32\\msv1_0.DLL<br \/>\nBerichtskennung: afc36fda-7320-11ec-813a-00155d012601<br \/>\nFull name of the corrupted package:<br \/>\nApplication ID relative to the corrupted package: \"\".<\/p>\n<p>This will cause an immediate bootloop.<\/p>\n<p>I want to advise against rolling back snapshots, especially for DC's, to avoid provoking USN rollbacks.<\/p>\n<p>Workaround:<\/p>\n<p>Prevent one of the two DC's from booting, then uninstall today's hotfixes first on one and then on the other DC.<\/p><\/blockquote>\n<p>I haven't found any other hits in a search yet. Addendum: There is a 2nd issue that's reported by blog readers:<\/p>\n<blockquote><p>On all Windows 2012 R2 servers, all ReFs volumes are in RAW format after installation.<\/p>\n<p>The cause seems to be KB5009624. After uninstalling the update and rebooting the server, the drives are present again.<\/p><\/blockquote>\n<p><strong>Addendum:<\/strong> I've published a separate article <a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/windows-server-januar-2022-sicherheitsupdates-verursachen-boot-schleife\/\">Windows Server: January 2022 security udpdates are causing DC boot loop<\/a>, because other Windows Server DC versions are also affected.<\/p>\n<h2>Updates for Windows Server 2012<\/h2>\n<p>A rollup and a security-only update have been released for Windows Server 2012 and Windows Embedded 8 Standard. The update history for Windows 8.1 and Windows Server 2012 R2 can be found on <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/windows-server-2012-update-history-abfb9afd-2ebf-1c19-4224-ad86f8741edd\" target=\"_blank\" rel=\"noopener\">this Microsoft page<\/a>.<\/p>\n<h3>KB5009586 (Monthly Rollup) for Windows Server 2012<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/help\/5009586\" target=\"_blank\" rel=\"noopener\">KB5009586<\/a> (Monthly Rollup for Windows Server 2012, Windows Embedded 8 Standard) contains improvements and fixes, and addresses the same issues as update <a href=\"https:\/\/support.microsoft.com\/help\/5009624\" target=\"_blank\" rel=\"noopener\">KB5009624<\/a>. This update is automatically downloaded and installed by Windows Update, but is also available from the <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB5009586\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>\u00a0 and via WSUS. If installing manually, the latest Servicing Stack Update (SSU <a href=\"https:\/\/support.microsoft.com\/help\/5001401\" target=\"_blank\" rel=\"noopener\">KB5001401<\/a>) must be installed beforehand &#8211; although this SSU cannot be uninstalled. This update have the same known issues as the updates listed above.<\/p>\n<h3>KB5009619 (Security-only update) for Windows Server 2012<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/help\/5009619\" target=\"_blank\" rel=\"noopener\">KB5009619<\/a> (Security Only Quality Update for Windows Server 2012, Windows Embedded 8 Standard) addresses the same issues as update <a href=\"https:\/\/support.microsoft.com\/help\/5009624\" target=\"_blank\" rel=\"noopener\">KB5009624<\/a>.\u00a0 The update is distributed via WSUS (but not via Windows Update) or is available in the <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=kb5009619\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. In case of a manual installation, the latest Servicing Stack Update (SSU) <a href=\"https:\/\/support.microsoft.com\/help\/5001401\" target=\"_blank\" rel=\"noopener\">KB5001401<\/a> must be installed first. In addition, if not already available, the Internet Explorer 11 security update <a href=\"https:\/\/support.microsoft.com\/help\/5006671\" target=\"_blank\" rel=\"noopener\">KB5006671<\/a> from Oct. 2021 should be installed.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2022\/01\/05\/microsoft-office-updates-4-januar-2022\/\">Microsoft Office Updates (January 4, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/11\/microsoft-security-update-summary-11-januar-2022\/\">Microsoft Security Update Summary (January 11, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/patchday-windows-8-1-server-2012-r2-updates-11-januar-2022-mgliche-boot-probleme\/\">Patchday: Windows 8.1\/Server 2012 R2 Updates (January 11, 2022), boot loop reported<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/patchday-windows-10-updates-11-januar-2022\/\">Patchday: Windows 10 Updates (January 11, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/patchday-windows-11-updates-11-januar-2022\/\">Patchday: Windows 11 Updates (January 11, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/patchday-updates-fr-windows-7-server-2008-r2-11-januar-2022\/\">Patchday: Updates for Windows 7\/Server 2008 R2 (January 11, 2022)<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/windows-server-januar-2022-sicherheitsupdates-verursachen-boot-schleife\/\">Windows Server: January 2022 security updates are causing DC boot loop<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/windows-vpn-verbindungen-l2tp-over-ipsec-nach-januar-2022-update-kaputt\/\">Windows VPN connections (L2TP over IPSEC) broken after January 2022 update<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/windows-server-2012-r2-januar-2022-update-kb5009586-brickt-hyper-v-host\/\" rel=\"bookmark\">Windows Server 2012\/R2: January 2022 Update KB5009586 bricks Hyper-V Host<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]As of January 11, 2022, Microsoft has released various updates for Windows 8.1. These security updates are also available for Windows Server 2012 R2. I have already received information from a blog reader that a boot loop has occurred with &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/patchday-windows-8-1-server-2012-r2-updates-11-januar-2022-mgliche-boot-probleme\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463,580,2],"tags":[2700,69,195,567],"class_list":["post-22888","post","type-post","status-publish","format-standard","hentry","category-issue","category-security","category-windows","tag-patchday-1-2022","tag-security","tag-update","tag-windows-server-2012-r2"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=22888"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22888\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=22888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=22888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=22888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}