title | description | author | ms.topic | ms.date | ms.author | ms.reviewer |
---|---|---|---|---|---|---|
February 2024 OS security update (KB 5034769) for Azure Stack HCI, version 23H2 |
Read about the February 2024 OS security update (KB 5034769) for Azure Stack HCI, version 23H2. |
alkohli |
conceptual |
03/20/2024 |
alkohli |
alkohli |
[!INCLUDE applies-to]
This article describes the OS security update for Azure Stack HCI, version 23H2 that was released on February 13, 2024 and applies to OS build 25398.709.
This security update includes quality improvements. When you install this KB:
-
This update affects software defined networking (SDN). You can now deploy SDN on Windows failover clustering. Service Fabric SDN deployment remains in support.
-
This update addresses a handle leak in Windows Management Instrumentation (WMI) provider traces. Because of this, WMI commands fail at a random stage when you deploy a cluster.
-
This update addresses an issue that affects remote direct memory access (RDMA) performance counters. They don't return networking data on VMs in the right way.
-
This update addresses an issue that affects fontdrvhost.exe. It stops responding when you use Compact Font Format version 2 (CFF2) fonts.
-
This update addresses an issue that affects clusters. It stops you from registering a cluster using Network ATC. This occurs after you set the proxy to use Network ATC. The issue also stops a preset proxy configuration from clearing.
-
This update addresses a memory leak in TextInputHost.exe. The leak might cause text input to stop working on devices that haven't restarted for many days.
-
This update addresses an issue that affects touchscreens. They don't work properly when you use more than one monitor.
-
This update includes quarterly changes to the Windows Kernel Vulnerable Driver Blocklist file, DriverSiPolicy.p7b. It adds to the list of drivers that are at risk for Bring Your Own Vulnerable Driver (BYOVD) attacks.
-
This update affects Unified Extensible Firmware Interface (UEFI) Secure Boot systems. It adds a renewed signing certificate to the Secure Boot DB variable. You can now opt for this change. For more information, see KB5036210.
-
This update addresses an issue that occurs after you run a Push-button reset. You can't set up Windows Hello facial recognition. This affects devices that have Windows Enhanced Sign-in Security (ESS) turned on.
-
This update addresses an issue that affects the download of device metadata. Downloads from the Windows Metadata and Internet Services (WMIS) over HTTPS are now more secure.
-
This update addresses an issue that affects the Local Security Authority Subsystem Service (LSASS). It might stop working. This occurs when you access the Active Directory database.
-
This update addresses an issue that affects the Certificate Authority snap-in. You can't select the "Delta CRL" option. This stops you from using the GUI to publish Delta CRLs.
For more information about security vulnerabilities, see the Security Update Guide and the February 2024 Security Updates.
To return to the Azure Stack HCI documentation site.
Microsoft isn't currently aware of any issues with this update.
Microsoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.
To install the LCU on your Azure Stack HCI cluster, see Update Azure Stack HCI via PowerShell.
For a list of the files that are provided in this update, download the file information for cumulative update 5034769.
- Install updates via PowerShell for Azure Stack HCI, version 23H2.
- Install updates via Azure Update Manager in Azure portal for Azure Stack HCI, version 23H2.