** 2 Weeks After Patch Tuesday **
Some minor disruptions have been reported, mainly with Fortinet FSSO, two reports of MSFT Key Distribution Center service failing to start causing authorization failures, and AuthLite breaking if not running 2.15.16 before installing.
No catastrophic failures reported.
One OOB update for Server 2022 was released 9 days after original release to address Azure Synapse SQL Serverless Pool databases stuck in “Recovery pending” state.
Reported Disruptions by OS Version:
Server 2022 (KB5039227)
- Fortinet: FSSO breaks after updating
- MSFT: You might be unable to change your user account profile picture
- MSFT: You might see an issue on cloud-based SQL servers where Azure Synapse SQL Serverless Pool databases go on “Recovery pending” state. This issue is more likely to affect environments utilizing Customer-Managed Key (CMK) and Azure Synapse dedicated SQL pool (OOB fix KB5041054).
- AuthLite: Update to AuthLite 2.5.16 before installing MSFT’s June update
Server 2019 (KB5039217)
- Fortinet: FSSO breaks after updating
- AuthLite: Update to AuthLite 2.5.16 before installing MSFT’s June update
Server 2016
- AuthLite: Update to AuthLite 2.5.16 before installing MSFT’s June update
Windows 11 23H2
- Disruption of misc ticket printing services
Windows 11 21H2
- MSFT: You might be unable to change your user account profile picture
Windows 10 21H2 & 22H2
- MSFT: You might be unable to change your user account profile picture
Sources in comments
SOURCES:
Server 2022 Authorization failure reports: https://www.reddit.com/r/sysadmin/comments/1dd65v4/comment/l9atdtn/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button
Server 2022 Update: https://support.microsoft.com/en-us/topic/june-11-2024-kb5039227-os-build-20348-2527-894a0e2d-6b5f-4c5b-9e61-82f45024ff4f
Windows 11 23H2 printing disruption: https://www.reddit.com/r/sysadmin/comments/1dd65v4/comment/l8bc6yt/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button
Windows 11 21H2 Update: https://support.microsoft.com/en-us/topic/june-11-2024-kb5039213-os-build-22000-3019-162ab53e-6c89-4991-9c16-37633fdb0be0
Windows 10 21H2 & 22H2 Update: https://support.microsoft.com/en-us/topic/june-11-2024-kb5039211-os-builds-19044-4529-and-19045-4529-f7e528c9-5e9f-4cd8-9161-704708448517
MSFT Release Health: https://learn.microsoft.com/en-us/windows/release-health/
r/sysadmin June Patch Tuesday Megathread: https://www.reddit.com/r/sysadmin/comments/1dd65v4/patch_tuesday_megathread_20240611/
~~ 72 Hours After Patch Tuesday ~~
Nearly 72 hours in since Microsoft’s June updates went live and across the trackd platform we’ve seen 0 disruptions for all currently supported versions of Windows (11, 10, Server 2022, 2019, and 2016).
Additionally, none have been reported in r/sysadmin (except if you use AuthLite on your Domain Controllers)
For those you that trust Microsoft’s Release Health assertions this earl, it’s also all quiet 😉
So what are you waiting for? Go patch your shit already.
Learn more about our real-time patch disruption intelligence, vulnerability identification, and patching at https://trackd.com/how-does-it-work/
June 2024 – Another one! Microsoft Patch Tuesday is live…
Microsoft:
49 vulnerabilities addressed (plus 9 others for Chromium and non-MSFT products), 0 zero days, and just 1 critical
Source in comments
~ COMMENTS ~
https://msrc.microsoft.com/update-guide/releaseNote/2024-Jun