trackd_logo_dark-1

June’s (2024) Microsoft Patch Tuesday Damage Report

** 2 Weeks After Patch Tuesday **

Some minor disruptions have been reported, mainly with Fortinet FSSO, two reports of MSFT Key Distribution Center service failing to start causing authorization failures, and AuthLite breaking if not running 2.15.16 before installing.

No catastrophic failures reported. 

One OOB update for Server 2022 was released 9 days after original release to address Azure Synapse SQL Serverless Pool databases stuck in “Recovery pending” state.

Reported Disruptions by OS Version:

Server 2022 (KB5039227)

  • Fortinet: FSSO breaks after updating
  • MSFT: You might be unable to change your user account profile picture
  • MSFT: You might see an issue on cloud-based SQL servers where Azure Synapse SQL Serverless Pool databases go on “Recovery pending” state. This issue is more likely to affect environments utilizing Customer-Managed Key (CMK) and Azure Synapse dedicated SQL pool (OOB fix KB5041054).
  • AuthLite: Update to AuthLite 2.5.16 before installing MSFT’s June update

Server 2019 (KB5039217)

  • Fortinet: FSSO breaks after updating
  • AuthLite: Update to AuthLite 2.5.16 before installing MSFT’s June update

Server 2016

  • AuthLite: Update to AuthLite 2.5.16 before installing MSFT’s June update

Windows 11 23H2

  • Disruption of misc ticket printing services

Windows 11 21H2

  • MSFT: You might be unable to change your user account profile picture

Windows 10 21H2 & 22H2

  • MSFT: You might be unable to change your user account profile picture

Sources in comments

SOURCES:

Server 2022 Authorization failure reports: https://www.reddit.com/r/sysadmin/comments/1dd65v4/comment/l9atdtn/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button

Comment
byu/AutoModerator from discussion
insysadmin

Fortinet: https://community.fortinet.com/t5/FortiGate/Technical-Tip-FSSO-breaks-after-installing-Microsoft-KB5039227/ta-p/321596

Server 2022 Update: https://support.microsoft.com/en-us/topic/june-11-2024-kb5039227-os-build-20348-2527-894a0e2d-6b5f-4c5b-9e61-82f45024ff4f

Windows 11 23H2 printing disruption: https://www.reddit.com/r/sysadmin/comments/1dd65v4/comment/l8bc6yt/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button

Windows 11 21H2 Update: https://support.microsoft.com/en-us/topic/june-11-2024-kb5039213-os-build-22000-3019-162ab53e-6c89-4991-9c16-37633fdb0be0

Windows 10 21H2 & 22H2 Update: https://support.microsoft.com/en-us/topic/june-11-2024-kb5039211-os-builds-19044-4529-and-19045-4529-f7e528c9-5e9f-4cd8-9161-704708448517

MSFT Release Health: https://learn.microsoft.com/en-us/windows/release-health/

r/sysadmin June Patch Tuesday Megathread: https://www.reddit.com/r/sysadmin/comments/1dd65v4/patch_tuesday_megathread_20240611/

~~ 72 Hours After Patch Tuesday ~~

Nearly 72 hours in since Microsoft’s June updates went live and across the trackd platform we’ve seen 0 disruptions for all currently supported versions of Windows (11, 10, Server 2022, 2019, and 2016).

Additionally, none have been reported in r/sysadmin (except if you use AuthLite on your Domain Controllers)

For those you that trust Microsoft’s Release Health assertions this earl, it’s also all quiet 😉

So what are you waiting for? Go patch your shit already.

Learn more about our real-time patch disruption intelligence, vulnerability identification, and patching at https://trackd.com/how-does-it-work/

June 2024 – Another one! Microsoft Patch Tuesday is live…

Microsoft:

49 vulnerabilities addressed (plus 9 others for Chromium and non-MSFT products), 0 zero days, and just 1 critical

Source in comments

~ COMMENTS ~

https://msrc.microsoft.com/update-guide/releaseNote/2024-Jun