[prev in list] [next in list] [prev in thread] [next in thread] 

List:       microsoft-security
Subject:    Microsoft Security Update Summary for September 14, 2021
From:       "Microsoft" <securitynotifications () e-mail ! microsoft ! com>
Date:       2021-09-14 21:18:43
Message-ID: 3e7ab8fc-23b2-4970-8fe0-f6a52cfa5091 () ind1s01mta1028 ! xt ! local
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Microsoft Security Update Summary for September 14, 2021
Issued: September 14, 2021
********************************************************************

This summary lists security updates released for September 14, 2021.

Complete information for the September 2021 security update release 
Can be found at <https://msrc.microsoft.com/update-guide/>.

Please note the following information regarding the security updates:

* For information regarding enabling Windows 10, version 1909 features, 
please see Windows 10, version 1909 delivery options: 
https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-
version-1909-delivery-options/ba-p/1002660. Note that these versions of 
Windows 10 share a common core operating system with an identical set of 
system files: 1903 and 1909; 2004, 20H2,and 21H1. They will also share the 
same security update KBs.
* Windows 10 updates are cumulative. The monthly security release 
includes all security fixes for vulnerabilities that affect Windows 
10, in addition to non-security updates. The updates are available 
via the Microsoft Update Catalog: 
https://catalog.update.microsoft.com/v7/site/Home.aspx.
* For information on lifecycle and support dates for Windows 10 
operating systems, please see the Windows Lifecycle Facts Sheet: 
https://support.microsoft.com/en-us/help/13853/windows-
lifecycle-fact-sheet).
* A list of the latest servicing stack updates for each operating 
system can be found in ADV990001: https://msrc.microsoft.com/update-
guide/vulnerability/ADV990001. This list will be 
updated whenever a new servicing stack update is released. It is 
important to install the latest servicing stack update.
* In addition to security changes for the vulnerabilities, updates 
include defense-in-depth updates to help improve security-related 
features.
* Customers running Windows 7, Windows Server 2008 R2, or Windows Server 2008 
need to purchase the Extended Security Update to continue receiving security 
updates. See https://support.microsoft.com/en-us/help/4522133/procedure-to-
continue-receiving-security-updates for more information.
* There is a change coming with regards to Servicing Stack Updates. Please 
see Simplifying SSUs for more information.


Critical Security Updates
============================

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016  (Server Core installation)
Windows Server 2019
Windows Server 2019  (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
Windows Server, version 20H2 (Server Core Installation)
HEVC Video Extensions
MPEG-2 Video Extension
Azure Open Management Infrastructure

Important Security Updates
============================

Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft Excel 2013 RT Service Pack 1
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft Excel 2016 (32-bit edition)
Microsoft Excel 2016 (64-bit edition)
Microsoft Office 2013 RT Service Pack 1
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2016 (64-bit edition)
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for Mac
Microsoft Office Online Server
Microsoft Office Web Apps Server 2013 Service Pack 1
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft SharePoint Server 2019
Microsoft Edge (Chromium-based)
Microsoft Edge for Android
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 - 16.6)
Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)
Visual Studio Code
Accessibility Insights for Android
Accessibility Insights for Android Service - v2.0.0
Azure Sphere
Microsoft Dynamics 365 Business Central 2020 Release Wave 2 - Update 17.10
Microsoft Dynamics 365 Business Central 2021 Release Wave 1 - Update 18.5


Other Information
=================

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing 
a Microsoft security update, it is a hoax that may contain 
malware or pointers to malicious websites. Microsoft does 
not distribute security updates via email. 

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, PGP is not required for 
reading security notifications, reading security information, or 
installing security updates. You can obtain the MSRC public PGP key
at 
<https://technet.microsoft.com/security/dn753714>.

********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

Microsoft respects your privacy. Please read our online Privacy
Statement at
<http://go.microsoft.com/fwlink/?LinkId=81184>.

If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwi
zard.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.

These settings will not affect any newsletters you've requested or
any mandatory service communications that are considered part of
certain Microsoft services.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEg0iscncjmT22JxoVtl38EsTnIbgFAmFBBvoACgkQtl38EsTn
IbhN6wgAziR6jQAcIcks/JM23XFU2nB0LZJ4mu5FME0VR8JIX3wpKm3AYT0zER8z
yVKWYnuGKYXCdXO495Y39RKfGf3EzwzNP5R5/y9cr05vXKfEdK3g9r8B3N/lTar9
SkblI8q7LL74Kp0YHaPr6S4KMnZaAnyFfTd2XSMsQxib+22JjjAOuNW9bvilGQFP
R0SkcfkmLmhV+gHgEdtj2ClxvfchT2nePad/XpnhDytAHp6r7VvMrok6by3vxYXr
JsB+Bdif4CVbcrdBfmu3sjCBhHobrHAuETjsark6M2Z/efT20vrO1d1vHm3TQ/bK
mdyzfoH920SWTyarwyII/3PVVhrc9Q==
=LKKn
-----END PGP SIGNATURE-----

If you would prefer not to receive future technical security 
notification alerts by email from Microsoft and its family of 
companies please visit the following website to unsubscribe: 

https://account.microsoft.com/profile/unsubscribe?CTID=0&ECID=7Mh1qWwXlklgTTOW6UnDMi86 \
fbEBzlShD%2Fxi4RJ0ksOqq43pPaIlfvkrTEEPVxlG&K=a4ef7028-1002-4cfe-b78e-9670651206ab&CMID=null&D=637671697567468962&PID=18015&TID=adfd46f4-992a-45ec-935c-4c9bc4baf506



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic