Microsoft today rolled out updates to plug at least 110 security holes in its Windows operating systems and other software. Yes, good people of the Windows world, it’s time once again to use XEOX!
Get back full control on windows update by using XEOX Job Editor.
The July 2022 Patch Tuesday Security Updates
This release consists of security updates for the following products, features and roles.
- AMD CPU Branch
- Azure Site Recovery
- Azure Storage Library
- Microsoft Defender for Endpoint
- Microsoft Edge (Chromium-based)
- Microsoft Graphics Component
- Microsoft Office
- Open Source Software
- Role: DNS Server
- Role: Windows Fax Service
- Role: Windows Hyper-V
- Skype for Business and Microsoft Lync
- Windows Active Directory
- Windows Advanced Local Procedure Call
- Windows BitLocker
- Windows Boot Manager
- Windows Client/Server Runtime Subsystem
- Windows Connected Devices Platform Service
- Windows Credential Guard
- Windows Fast FAT Driver
- Windows Fax and Scan Service
- Windows Group Policy
- Windows IIS
- Windows Kernel
- Windows Media
- Windows Network File System
- Windows Performance Counters
- Windows Point-to-Point Tunneling Protocol
- Windows Portable Device Enumerator Service
- Windows Print Spooler Components
- Windows Remote Procedure Call Runtime
- Windows Security Account Manager
- Windows Server Service
- Windows Shell
- Windows Storage
- XBox
Information about updates:
- The new Hotpatching feature is now generally available. Please see Hotpatching feature for Windows Server Azure Edition virtual machines (VMs) for more information.
- Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the Microsoft Update Catalog. For information on lifecycle and support dates for Windows 10 operating systems, please see Windows Lifecycle Facts Sheet.
- Microsoft is improving Windows Release Notes. For more information, please see What’s next for Windows release notes.
- A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.
- In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.
- Customers running Windows 7, Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See 4522133 for more information.
The following KBs contain information about known issues with the security updates.
KB Article | Applies To |
---|---|
5002112 | Microsoft Office 2016 |
5002121 | Microsoft Office 2013 |
5015807 | Windows 10, version 20H2, Windows Server, version 20H2, Windows 10, version 21H1, Windows 10, version 21H2 |
5015811 | Windows 10, version 1809, Windows Server 2019 |
5015814 | Windows 11 |
5015827 | Windows Server 2022 |
5015861 | Windows 7, Windows Server 2008 R2 (Monthly Rollup) |
5015862 | Windows 7, Windows Server 2008 R2 (Security-only update) |
5015863 | Windows Server 2012 (Monthly Rollup) |
5015866 | Windows Server 2008 (Monthly Rollup) |
5015870 | Windows Server 2008 (Security-only update) |
5015874 | Windows 8.1, Windows Server 2012 R2 (Monthly Rollup) |
5015875 | Windows Server 2012 (Security-only update) |
5015877 | Windows 8.1, Windows Server 2012 R2 (Security-only update) |
More Information:
- CVE-2022-21845
- CVE-2022-22022
- CVE-2022-22023
- CVE-2022-22024
- CVE-2022-22026
- CVE-2022-22027
- CVE-2022-22028
- CVE-2022-22029
- CVE-2022-22031
- CVE-2022-22034
- CVE-2022-22036
- CVE-2022-22037
- CVE-2022-22038
- CVE-2022-22039
- CVE-2022-22040
- CVE-2022-22041
- CVE-2022-22042
- CVE-2022-22043
- CVE-2022-22045
- CVE-2022-22047
- CVE-2022-22048
- CVE-2022-22049
- CVE-2022-22050
- CVE-2022-22711
- CVE-2022-2294
- CVE-2022-2295
- CVE-2022-23816
- CVE-2022-23825
- CVE-2022-27776
- CVE-2022-30181
- CVE-2022-30187
- CVE-2022-30202
- CVE-2022-30203
- CVE-2022-30205
- CVE-2022-30206
- CVE-2022-30209
- CVE-2022-30211
- CVE-2022-30212
- CVE-2022-30213
- CVE-2022-30214
- CVE-2022-30215
- CVE-2022-30216
- CVE-2022-30220
- CVE-2022-30221
- CVE-2022-30222
- CVE-2022-30223
- CVE-2022-30224
- CVE-2022-30225
- CVE-2022-30226
- CVE-2022-33632
- CVE-2022-33633
- CVE-2022-33637
- CVE-2022-33641
- CVE-2022-33642
- CVE-2022-33643
- CVE-2022-33644
- CVE-2022-33650
- CVE-2022-33651
- CVE-2022-33652
- CVE-2022-33653
- CVE-2022-33654
- CVE-2022-33655
- CVE-2022-33656
- CVE-2022-33657
- CVE-2022-33658
- CVE-2022-33659
- CVE-2022-33660
- CVE-2022-33661
- CVE-2022-33662
- CVE-2022-33663
- CVE-2022-33664
- CVE-2022-33665
- CVE-2022-33666
- CVE-2022-33667
- CVE-2022-33668
- CVE-2022-33669
- CVE-2022-33671
- CVE-2022-33672
- CVE-2022-33673
- CVE-2022-33674
- CVE-2022-33675
- CVE-2022-33676
- CVE-2022-33677
- CVE-2022-33678
More Information:
https://msrc.microsoft.com/update-guide/releaseNote/2022-Jul
https://www.computerbild.de/artikel/cb-Aktuell-Sicherheit-Microsoft-Patchday-2022-7687678.html