July 19, 2019 - IMPORTANT: Beginning with the July 2019 updates, Active Directory domain controllers will intentionally block unconstrained delegation across forest, external, and quarantined trusts. Authentication requests for services that use unconstrained delegation over the listed trust types will fail when you request new tickets. Administrators should reconfigure the affected services to use resource-based constrained delegation. For more information, see KB4490425.
Improvements and fixes
This security update includes improvements and fixes that were a part of update KB4503283 (released June 20, 2019) and addresses the following issues:
- Provides protections against a variant (CVE-2019-1125) of the Spectre Variant 1 speculative execution side channel vulnerability.
- Addresses an issue that may cause BitLocker to go into recovery mode if BitLocker is being provisioned at the same time as updates are being installed.
- Security updates to Windows Wireless Networking, Windows Server, Windows Storage and Filesystems, Microsoft Graphics Component, Windows Input and Composition, Windows Kernel, and Windows App Platform and Frameworks.
For more information about the resolved security vulnerabilities, please refer to the Security Update Guide.
Known issues in this update
|Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.|| |
Do one of the following:
|Microsoft and McAfee have identified an issue on devices with McAfee Endpoint Security (ENS) Threat Prevention 10.x or McAfee Host Intrusion Prevention (Host IPS) 8.0 or McAfee VirusScan Enterprise (VSE) 8.8 installed. It may cause the system to have slow startup or become unresponsive at restart after installing this update.|| |
This issue has been resolved. McAfee has released an automatic update to address this issue.
Guidance for McAfee customers can be found in the following McAfee support articles:
After installing this update, opening or using the Window-Eyes screen reader app may result in an error and some features may not function as expected.Note Users who have already migrated from Window-Eyes to Freedom Scientific's other screen reader, JAWS, should not be affected by this issue.
|This issue is resolved in KB4507463.|
|Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error "Status: 0xc0000001, Info: A required device isn't connected or can't be accessed" after installing this update on a WDS server.|| |
For mitigation instructions, see KB4512816.
We are working on a resolution and will provide an update in an upcoming release.
How to get this update
Before installing this update
Microsoft strongly recommends you install the latest servicing stack update (SSU) for your operating system before installing the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes.
Install this update
|Release Channel||Available||Next Step|
|Windows Update and Microsoft Update||Yes||None. This update will be downloaded and installed automatically from Windows Update.|
|Microsoft Update Catalog||Yes||To get the standalone package for this update, go to the Microsoft Update Catalog website.|
|Windows Server Update Services (WSUS)||Yes|| |
This update will automatically synchronize with WSUS if you configure Products and Classifications as follows:
Product: Windows 8.1, Windows Server 2012 R2Classification: Security Updates
For a list of the files that are provided in this update, download the file information for update 4507448.