October 11, 2022—KB5018479 (Security-only update)
Berlaku Untuk
Tanggal Rilis:
11/10/2022
Versi:
Security-only update
Summary
Learn more about this security-only update, including improvements, any known issues, and how to get the update.
REMINDERĀ Windows 7, Windows Server 2008 R2, Windows Embedded Standard 7, and Windows Embedded POS Ready 7 have reached the end of mainstream support and are now in extended security update (ESU) support. Windows Thin PC has reached the end of mainstream support; however, ESU support is not available.Ā
Starting in July 2020, there will no longer be optional, non-security releases (known asĀ "C"Ā releases) for this operating system. Operating systems in extended support haveĀ onlyĀ cumulative monthly security updates (known as the "B" or Update Tuesday release).
Verify thatĀ you have installed the required updates in theĀ How to get this updateĀ sectionĀ beforeĀ installing this update.Ā
Customers who have purchased theĀ Extended Security Update (ESU)Ā forĀ on-premises versions of this OSĀ must follow the proceduresĀ inĀ KB4522133Ā to continue receiving security updates after extended support endedĀ onĀ January 14, 2020.Ā For more information about ESU and which editions are supported, seeĀ KB4497181.Ā
Because ESU is available as a separate SKU forĀ each of the years in which they are offered (2020, 2021, and 2022)āand because ESU can only be purchased inĀ specific 12-month periodsāyou must purchase the third year of ESU coverage separately and activate a new key on each applicable device for your devices to continue receiving security updates in 2022.
If your organization did not purchase the third year of ESU coverage, you must purchase Year 1, Year 2, and Year 3 ESU for your applicable Windows 7 SP1 or Windows Server 2008 R2 SP1 devices before you install and activate the Year 3 MAK keys to receive updates. The steps toĀ install, activate, and deploy ESUsĀ are the same for first, second, and third year coverage. For more information, seeĀ Obtaining Extended Security Updates for eligible Windows devicesĀ for the Volume Licensing process andĀ Purchasing Windows 7 ESUs as a Cloud Solution ProviderĀ for the CSP process. For embedded devices, contact your original equipment manufacturer (OEM).
For more information, see theĀ ESU blog.
Improvements
This security-only update includes key changes for the following:
-
Addresses an issue that leads to User Datagram Protocol (UDP) packet drops from Linux virtual machines (VMs).
-
Updates daylight saving time (DST) in Chile to start on September 11, 2022 instead of September 4, 2022.
-
Addresses a known issue in which file copies which useĀ Group Policy PreferencesĀ might fail or might create empty shortcuts or files that have 0 (zero) bytes.
For more information about the resolved security vulnerabilities, please refer to the Deployments | Security Update GuideĀ and the October 2022 Security Updates.
Known issues in this update
|
Symptom |
Next step |
|
After installing this update and restarting your device, you might receive the error, āFailure to configure Windows updates. Reverting Changes. Do not turn off your computer,ā and the update might show asĀ FailedĀ inĀ Update History. |
This is expected in the following circumstances:
|
|
On October 5, 2022, the Jordanian government made an official announcement ending the winter-time Daylight Saving Time (DST) time zone change. Starting at 12:00 a.m. Friday, October 28, 2022, the official time will not advance by an hour and will permanently shift to the UTC + 3 time zone.Ā The impact of this change is as follows:Ā
Symptoms if no update is installed and the workaround is not used on devices in the Jordan time zone on October 28, 2022 or later:
Windows devices and apps outside of Jordan might also be affected if they are connecting to servers or devices in Jordan or if they are scheduling or attending meetings taking place in Jordan from another location or time zone. Windows devices outside of Jordan should not use the workaround, as it would change their local time on the device. |
This issue is addressed in KB5020013. This update will not install automatically. To apply this update, you can check for updates and select the optional preview to download and install. If you cannot install this update, you can mitigate this issue on devices in Jordan by doing either of the following on October 28, 2022:
Important We recommend using ONLY the above workaround to mitigate the issue with time created by the new Daylight Savings Time in Jordan. We do NOT recommend using any other workaround, as they can create inconsistent results and might create serious issues if done incorrectly. |
|
After this update or a later Windows update is installed, domain join operations might be unsuccessful and error "0xaac (2732): NERR_AccountReuseBlockedByPolicy" occurs. Additionally, text stating "An account with the same name exists in Active Directory. Re-using the account was blocked by security policy" might be displayed. Affected scenarios include some domain join or re-imaging operations where a computer account was created or pre-staged by a different identity than the identity used to join or re-join the computer to the domain. For more information about this issue, see KB5020276āNetjoin: Domain join hardening changes. Note Consumer Desktop editions of Windows are unlikely to experience this issue. |
Please see KB5020276 for guidance on this issue. |
|
After installing this update, some types of Secure Sockets Layer (SSL) and Transport Layer Security (TLS) connections might have handshake failures. Note for developers: Affected connections might send multiple frames in a single input buffer. Specifically, one or more complete records with a partial record that is less than 5 bytes might be sent in a single buffer. When encountering this issue, your app will receive SEC_E_ILLEGAL_MESSAGEĀ when the connection fails. |
To address this issue, install update KB5020448. Then, we recommend that you install the latest security update for your device. Note Update KB5020448Ā will not install automatically. To apply this update, check for updates and then choose the Optional update to download and install. |
How to get this update
Before installing this update
IMPORTANTĀ Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures inĀ KB4522133Ā to continue receiving security updates. Extended support ended as follows:
-
For Windows 7 Service Pack 1 and Windows Server 2008 R2 Service Pack 1, extended support ended on January 14, 2020.
-
For Windows Embedded Standard 7, extended support ended on October 13, 2020.
-
For Windows Embedded POS Ready 7, extended support ended on October 12, 2021.
-
For Windows Thin PC, extended support ended on October 12, 2021. Note that ESU support is not available for Windows Thin PC.
For more information about ESU and which editions are supported, seeĀ KB4497181.
NoteĀ For Windows Embedded Standard 7, Windows Management Instrumentation (WMI) mustĀ be enabled toĀ get updates from Windows Update or Windows Server Update Services.
Language packs
If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, seeĀ Add language packs to Windows.
Prerequisite:
You must installĀ the updates listed below andĀ restart your deviceĀ before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.
-
TheĀ March 12, 2019 servicing stack update (SSU) (KB4490628).Ā To get the standalone package for this SSU, search for it in theĀ Microsoft Update Catalog. This update is required to install updates that are only SHA-2 signed.
-
The latest SHA-2 update (KB4474419) released September 10, 2019. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, seeĀ 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.
-
To get this security update, you must reinstall the "Extended Security Updates (ESU) Licensing Preparation Package" (KB4538483) or the "Update for the Extended Security Updates (ESU) Licensing Preparation Package" (KB4575903) even if you previously installed the ESU key. TheĀ ESU licensing preparation package will be offered to you from WSUS.Ā To get the standalone package for ESU licensing preparation package, search for it in theĀ Microsoft Update Catalog.
After installing the items above, Microsoft strongly recommends that you install theĀ latestĀ SSU (KB5017397).Ā If you are using Windows Update, the latest SSUĀ will be offered to you automatically if you are an ESU customer.Ā To get the standalone package for the latestĀ SSU, search for it in theĀ Microsoft Update Catalog. For general information about SSUs,Ā seeĀ Servicing stack updatesĀ andĀ Servicing Stack Updates (SSU): Frequently Asked Questions.
REMINDERĀ If you are using Security-only updates, you will also need to install all previous Security-only updates and the latest cumulative update for Internet Explorer (KB5018413).
Install this update
|
Release Channel |
Available |
Next Step |
|
Windows Update and Microsoft Update |
No |
See the other options below. |
|
Microsoft Update Catalog |
Yes |
To get the standalone package for this update, go to theĀ Microsoft Update CatalogĀ website. |
|
Windows Server Update Services (WSUS) |
Yes |
This update will automatically syncĀ with WSUS if you configureĀ Products and ClassificationsĀ as follows: Product:Ā Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1,Ā Windows Embedded Standard 7 Service Pack 1, Windows Embedded POSReady 7 Classification: Security Updates |
File information
For a list of the files that are provided in this update, download theĀ file information for update KB5018479.
References
Learn about the standard terminology that is used to describe Microsoft software updates.