ISSUE 19.02.1 • 2022-01-12 By Susan Bradley For those running a network with a domain controller, the side effects this month are extreme. Don’t patch
[See the full post at: MS-DEFCON 1: Business patchers be on alert]
Susan Bradley Patch Lady
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
Home » Forums » Newsletter and Homepage topics » MS-DEFCON 1: Business patchers be on alert
ISSUE 19.02.1 • 2022-01-12 By Susan Bradley For those running a network with a domain controller, the side effects this month are extreme. Don’t patch
[See the full post at: MS-DEFCON 1: Business patchers be on alert]
Susan Bradley Patch Lady
Stop the windows update service. Delete the software distribution folder.
https://www.windowscentral.com/how-clear-softwaredistribution-folder-windows-10
Susan Bradley Patch Lady
First, don’t press Install Now on the Windows Update screen.
Second, if you don’t use WSUS, set the Windows Update policies to download only and notify to install:
Go to your GPOs, create a policy for your servers, using their names for example, and set Configure Windows Updates to option 3. This is located in Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Windows Update. Then enforce the policy by enabling it. That’s how I am set so that I have a backup first, then schedule install and reboot.
Hope it helps.
There’s a mitigation workaround.
https://isc.sans.edu/forums/diary/A+Quick+CVE202221907+FAQ+work+in+progress/28234/
For Windows Server 2019 and Windows 10 Version 1809, the “HKLM:\System\CurrentControlSet\Services\HTTP\Parameter\EnableTrailerSupport” is set to 0 by default disabling trailers. You can check this registry value in Powershell (thanks, Rob)l:
Get-ItemProperty “HKLM:\System\CurrentControlSet\Services\HTTP\Parameters” | Select-Object EnableTrailerSupport
Susan Bradley Patch Lady
The mitigation was “clarified” sometime today:
“This mitigation only applies to Windows Server 2019 and Windows 10, version 1809 and does not apply to the Windows 21H1 and newer.”
HTTP Protocol Stack Remote Code Execution Vulnerability
CVE-2022-21907
Windows 11 Pro version 22H2 build 22621.1778 + Microsoft 365 + Edge
If the Server 2012 R2 or 2016 or 2019 are set to download the update but set for manual install can’t you simply wait until Microsoft fixes the update and the system will download the fixed update automatically without you having to do anything further until the ALL CLEAR is given then you can proceed to manually install the update ? Thanks for any input.
You can wait for a better update and ignore the one displayed on Windows Update (Windows it will notify you many times) or download a cumulative MSU that replaces the bad update and install that.
Ignore and wait it’s the best thing I can do right now. Fortunately I’m running Windows Server 2016 so the CVE-2022-21907 vulnerability shouldn’t be a concern.
Hi.
patched my hyper-v host server running 2016 – no issues as yet with host. No reboot loops all patches went on ok.
fired up 3 vm devices on the above host (2016 ad dc, 2016 rras server, 2016 sccm/mecm server version 2111).
rras server was patched first, Went through without issue at all.
dc fired up, same patch stopped at 95% wouldn’t go on, so Went to windows catalogue and got patch 1.2gb approx, installed manually fine. Dc patched, no reboots or issues seen thus far.
sccm/mecm single box patched fine, seems to be working.
got 2 more 2016 servers, and 1 2019 server on hyper-v host i can patch to test. Will snapshot first, as i have played it loose with snapshots so far.
this any use to anyone?
seems 2016 isnt effected from what i am seeing? Anyone seen different?
November Patch Tuesday took down one DC, where removing the updates did not restore stability…constant reboots every 15-60 minutes. Had to decommission and delete. Luckily, it stayed up long enough to finish the process.
January Patch Tuesday started the same crash/boot cycle in 2012r2 DC. Not as often, but still crashed 5-6 times yesterday.
Anecdotally, I stayed RDP’d to this for long periods of time. It would not crash while I was logged on. But within minutes of logoff, it restarted. Maybe a bit of Heisenberg uncertainty, or wishful thinking?
UPDATE: MSFT has now pulled kb5009624 for Windows Server 2012 R2, kb5009557 for Windows Server 2019 and kb5009555 for Windows Server 2022, due to bugs… Hyper-V not starting, DC bootloops and inaccessible ReFS volumes displaying RAW filesystems.
Still available in the Update Catalog, go figure..
https://www.bleepingcomputer.com/news/microsoft/microsoft-pulls-new-windows-server-updates-due-to-critical-bugs/#cid22230
Lawrence Abrams reporting that the pulled patches are back again (comments post)..uncertain whether anything has changed to patches.
If the MSUs in Microsoft Catalog are the same, then, most likely, no changes.
If someone downloaded the MSU of the 2022-12 update for one OS before they were pulled from Windows Update and then download the update again for the same OS on the catalog, you could figure it out by calculating the SHA256 hash of both files to see if they are the same.
I downloaded it for 2016 server. But this is not effected, my sql 2017 box is running on 2019 server this patched ok.
not sure why 2016 seems to be un effected, as the updates are cumulative, and you’d think if it was fixed in 2016 it would carry over into 2019 and server 2022. As the server code base moves on.
makes me think these 3 yearly releases aren’t always as fixed or secure as some previous release.
Should we patch Servers (2012 R2, 2016, 2019) that are Stand Alone and NOT Domain Controllers or should we wait for the ALL Clear ??
For Domain Controllers I get more confused the more I read and have NOT patched either of the Domain Controllers (2012R2) that I handle and I am looking for Guidance on exactly how to do this without having to worry about getting caught in a loop and having to run to customers far away and try to figure out how to back things out.
I do all my updates remotely. I simply have whatever Microsoft has downloaded sitting in Que waiting to be installed and I am looking for step by step guidance on how to update for January.
Thanks for any responses.
YMMV.
Standalone servers
We have not seen any re-boot issues with non-DC servers. We have let many of them patch via WSUS or Microsoft Updates in their normal cycle.
Domain Controllers
We have had 2/3 in reboot loops, so stopped automated updates. Now that we have updates to the updates, we need to:
Switch to manual updates:
Remove what was already downloaded
download appropriate manual installer
Install manually
cd c:\install\2022[TAB][ENTER] [TAB][ENTER]
Microsoft Windows [Version x.x.xxxx] (c) 2013 Microsoft Corporation. All rights reserved. C:\Windows\system32>cd "c:\install\2022-01 Update for Windows Server 2012 R2 for x64-based Systems (KB5010794)" c:\INSTALL\2022-01 Update for Windows Server 2012 R2 for x64-based Systems (KB5010794)>windows8.1-kb5010794-x64_3b350eb34833c9a3ac71d973db3fd8ae86a6b220.msu
The link you provided is for the out of band for November’s Kerberos issue (we’ve had a tad too many and it’s hard to keep up)
https://www.askwoody.com/2022/various-out-of-band-updates-out-to-fix-january-patch-issues/
Be aware that the 2012 R2 server patch is a security only and is not cumulative.
For those that are Plus members (and remember, a mere $1 in the donate jar gives you access) they are on the Master patch listing https://www.askwoody.com/patch-list-master/ – look in the latest Excel/CSV/PDF/HTML versions of the listing dated January 24 – I posted up early in case anyone needs to deploy this weekend.
Susan Bradley Patch Lady
Sorry about that old link. I had it bookmarked for earlier DC problems after Patch Tuesday.
I don’t want to send people away from this site with links elsewhere if that’s not kosher.
We can summarize to ‘download the appropriate MSU for your OS’.
I’ll definitely take a look at the master list from your link.
Makes no sense to me that they do not simply pull the bad cumulative patch (or any bad patches for that matter) and replace with the fixed one especially for people who have not installed it yet instead of all this manual work. How inefficient !!! Also be nice if they do some testing once in a while. Microsoft has turned updating into a Nightmare from the depth’s of He”ll”. We are worse off now then we were years ago.
Guess I am getting OLD……..
Sorry for the rant – I have been Time Burgled with this !!!
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2023 by AskWoody Tech LLC. All Rights Reserved.