{"id":18266,"date":"2022-02-12T06:05:40","date_gmt":"2022-02-12T14:05:40","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/12\/news-11999\/"},"modified":"2022-02-12T06:05:40","modified_gmt":"2022-02-12T14:05:40","slug":"news-11999","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/12\/news-11999\/","title":{"rendered":"Take your time testing these February Patch Tuesday updates"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Fri, 11 Feb 2022 12:21:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">There are (<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/DeployEdge\/microsoft-edge-relnotes-security\" rel=\"noopener nofollow\" target=\"_blank\">as of now<\/a><span style=\"font-weight: 400;\">) 51 patches to the Windows ecosystem for February, but no critical updates and no &#8220;Patch Now&#8221; recommendations from the Readiness team. I&#8217;m hoping that with this month&#8217;s list of Patch Tuesday updates, we can enjoy the quiet after the storm. January was tough for a lot of folks. And, with this month&#8217;s very light release from Microsoft, corporate security and systems administrators can take the time needed to test their applications and desktop\/server builds. It&#8217;s also important to invest in their testing methodologies, release practices, and how their applications may be affected by OS-level updates and patches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can find more information on the risk of deploying these Patch Tuesday updates <a href=\"https:\/\/applicationreadiness.com\/assurance-security-dashboard-december-2021\/\" rel=\"noopener nofollow\" target=\"_blank\">using our detailed infographic<\/a><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are no reported high-risk changes to Windows this month. However, there is one reported functional change, and an additional feature added:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When testing your printing services, ensure that you are validating your<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/printdocs\/print-spooler\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">spooler<\/span><\/a><span style=\"font-weight: 400;\"> and SHD (shadow files). Testing these service artifacts is especially important if you employ symbolic or hard links to access these jobs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, Microsoft includes a list of known issues that relate to the operating system and platforms included in this update cycle. There is more than usual, so I have referenced a few key issues that relate to the latest builds from Microsoft including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After installing updates released Jan. 11 or later, applications that use the Microsoft .NET Framework to acquire or set Active Directory Forest Trust Information might have issues. The apps might fail or close, or you might receive an error from the app or Windows. You might also receive an access violation (0xc0000005) error. To resolve this issue manually, apply the out-of-band updates for the version of the .NET Framework used by the app. We recommend that you scan your internal line of business applications for any dependencies on<\/span><a href=\"https:\/\/docs.microsoft.com\/dotnet\/api\/system.directoryservices?view=dotnet-plat-ext-6.0\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">System.DirectoryServices API<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Though there is a much smaller list of patches this month, Microsoft released several revisions to previous patches, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month Microsoft has published two mitigating factors, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are a total of 22 (+1) updates to the Microsoft Edge (Chromium) browser this month. None are critical, with one patch rated moderate and the remaining rated important. Unusually, there was an additional update for Microsoft Edge posted yesterday (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-23264\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-23246<\/span><\/a><span style=\"font-weight: 400;\">) that was included as part of an updated release note for\u00a0<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/DeployEdge\/microsoft-edge-relnotes-security\" rel=\"noopener nofollow\" target=\"_blank\">Microsoft Edge security update found\u00a0here<\/a><span style=\"font-weight: 400;\">. Add these Chrome (Edge and Chromium) updates to your regular update release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We were hoping for a quieter update this month and Microsoft really delivered \u2014 with no critical updates for Windows or Microsoft Office. Given that January\u2019s release was large and complex, several problems were encountered, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To remedy these and other reported (minor) issues, a rare Out-of-Band (OOB) update<\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/january-17-2022-kb5010795-os-build-22000-438-out-of-band-2d2b9310-d845-41c4-9907-aeea24f36a63\" rel=\"noopener nofollow\" target=\"_blank\">\u00a0was released on Jan 17<\/a><span style=\"font-weight: 400;\">. Microsoft has posted 26 patches this month, covering Hyper-V, printing, error\/logging sub-systems, networking, and video codecs. Given the testing requirements for these types of changes to the core operating system, we suggest a staged approach and adding these Windows updates to your standard update release schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month&#8217;s patches for Microsoft Office will install on the following baselines:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Though Microsoft has published 11 updates (all rated important) for this release, only eight apply to Windows systems. Microsoft has shared some basic testing guidelines for the updates, including:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft also published a major known issue with this month&#8217;s Office update, saying: &#8220;<\/span><span style=\"font-weight: 400;\">The Machine Translation service fails if the content contains certain HTML tags.&#8221; To work around this issue, see <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/publishing-pages-cannot-be-translated-in-sharepoint-server-2019-kb5011291-d9156dea-7494-40f1-a023-81caadf572e2\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">Publishing pages cannot be translated in SharePoint Server 2019 (KB5011291)<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">All the local office installations (excluding click-to-run virtualized instances) require user interactions and do not significantly degrade the system if affected. These patches represent a low risk and have been documented to affect core functionality (potentially affecting dependent line-of-business applications). Add these updates to your standard Office update schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Following the trend of a very light patch cycle, Microsoft has not released any updates for the Exchange Server platform.<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Things are definitely light on the ground this month, but we do have a few very minor updates for Microsoft development tools, including two patches to Visual Studio (<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21986\" rel=\"noopener nofollow\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2022-21986<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21991\" rel=\"noopener nofollow\" target=\"_blank\"> <span style=\"font-weight: 400;\">CVE-2022-21991<\/span><\/a><span style=\"font-weight: 400;\">) Both of these minor updates are rated important by Microsoft and should be (almost casually) added to your standard development patch schedule.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adobe released several security updates this month, but luckily nothing for Adobe Reader. You can find Adobe&#8217;s\u00a0<\/span><a href=\"https:\/\/helpx.adobe.com\/security\/products\/premiere_rush\/apsb22-06.html\" rel=\"noopener nofollow\" target=\"_blank\">February release notes\u00a0here<\/a>; it<span style=\"font-weight: 400;\">\u00a0relates to Adobe Premier, Illustrator, Photoshop, After Effects, and Creative Cloud Desktop. Let&#8217;s see what Adobe has in store for us in March.<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3650013\/take-your-time-testing-these-february-patch-tuesday-updates.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/07\/microsoft_windows_updates_cycle_arrows_laptop_mobile_phone_3x2_1200x800-100851684-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Greg Lambert| Date: Fri, 11 Feb 2022 12:21:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">There are (<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/DeployEdge\/microsoft-edge-relnotes-security\" rel=\"noopener nofollow\" target=\"_blank\">as of now<\/a><span style=\"font-weight: 400;\">) 51 patches to the Windows ecosystem for February, but no critical updates and no &#8220;Patch Now&#8221; recommendations from the Readiness team. I&#8217;m hoping that with this month&#8217;s list of Patch Tuesday updates, we can enjoy the quiet after the storm. January was tough for a lot of folks. And, with this month&#8217;s very light release from Microsoft, corporate security and systems administrators can take the time needed to test their applications and desktop\/server builds. It&#8217;s also important to invest in their testing methodologies, release practices, and how their applications may be affected by OS-level updates and patches.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3650013\/take-your-time-testing-these-february-patch-tuesday-updates.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,714,24580,10525],"class_list":["post-18266","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-security","tag-small-and-medium-business","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18266"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18266\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18266"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}