There's something to be said for delayed gratification when Windows 11 is this full of bugs

Also: Emergency patch for Windows Server after Patch Tuesday broke single sign-on for some users


An update to the Insiders version of Windows 11 includes a massive list of bug fixes, many of them serious, showing the wisdom of holding back on an early upgrade from Windows 10.

Windows 11 was released on 5 October but has proved a problematic upgrade due to onerous system requirements and certain user interface decisions, with some features chopped in the Start menu and a confusing new right-click menu in File Explorer.

The new Insiders update, build 22000.346 for the Beta and Release Preview channels, shows another reason for not hastening to upgrade – bugs in the initial release. Release Preview means that these fixes should soon come to all users of Microsoft's latest Windows.

The company lists over 70 bug fixes, including significant issues like "we fixed an issue that causes the system to stop working after you enable Hyper-V" and "we fixed an issue that causes certain apps to stop responding to input" and "we fixed an issue that prevents your device from starting up, and it becomes unresponsive because of licensing API calls" and "we fixed an issue that causes devices that have certain processors to stop responding when waking from hibernation."

The bugs are not precisely described, with some vaguer than others. "We fixed an issue that occurs when a dialog opens within Internet Explorer," says one. Running Internet Explorer for any reason is something of an adventure today, so we are not surprised that an (unspecified) issue occurred; it is more notable that Microsoft fixed whatever it was.

Windows 11 introduced a novelty in the Windows world: a black screen of death. The traditional BSOD (Blue Screen of death) must be regarded with some affection, though, since another fix is that "we changed the screen color to blue when a device stops working or a stop error occurs as in previous versions of Windows." Note that the other common variant, the green screen of death, is reserved for Insider builds.

Other fixes concern Windows Subsystem for Linux, Group Policy, font rendering, memory leaks, errors connecting to "a remote printer that is shared on a Windows print server," USB printers not being detected, Windows Mixed Reality auto-starting when a headset is donned even when set not to do so, and the battery icon in Quick Settings disappearing.

Microsoft also notes that "we fixed an issue where OS functionality could be improperly redirected when microsoft-edge: links are invoked," perhaps a reference to this issue that affects the company's ability to cajole users into firing up Edge rather than competing web browsers.

We have been running Windows 11 for daily work since official release and are happy to report that it is usable and stable in our experience so far, though useful improvements over its predecessor are hard to identify. We have encountered an old friend from the early days of Windows 10, where the Start menu refuses to appear when summoned, whether by click or keyboard. The solution is to open Task Manager, then kill and restart the Explorer process, which is not too painful though hardly intuitive.

An out-of-band bug fix for Windows Server

Last week's "Patch Tuesday" security fixes introduced an authentication bug on Windows domain controllers. The affected component is Service for User to Self (S4U2self) which allows a service to obtain an authentication ticket on behalf of a user, without supplying a password (and yes, this can be a security vulnerability so it is not surprising to see it impacted by a patch).

Microsoft explains that following the 9 November update, "end users in your environment might be unable to sign into services or applications using Single Sign On (SSO) using Active Directory on-premises or in a hybrid Azure Active Directory environment."

Affected environments include Azure Active Direction application proxy, Web Application Proxy single sign-on, SQL Server, IIS with integrated Windows authentication, and load balancers performing delegated authentication.

Out-of-band fixes are relatively uncommon, but this one was sufficiently problematic that Microsoft has issued fixes for Windows Server 2019, 2016, 2012 R2, 2012, 2008 R2 and 2008 SP2. Information on how to install the update is here, though it will not be installed automatically.

It shows once again the dilemma facing administrators: patch quickly and risk breaking things, or slowly and risk being compromised by known vulnerabilities? ®


Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021