Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Update rollup includes a security update for Windows Embedded Compact 2013 (February 2017)


View products that this article applies to.

An update rollup is available for Windows Embedded Compact 2013. This rollup resolves the security issues that are described in the following article in the Microsoft Knowledge Base:

  • 3216771 MS17-004: Security update for Local Security Authority Subsystem Service: January 10, 2017

↑ Back to the top


More Information

Software update information

Download information

The Windows Embedded Compact 2013 monthly update for February 2017 is now available from Microsoft. To download this Windows Embedded Compact 2013 monthly update, go to Microsoft OEM Online or MyOEM.

Prerequisites

This update is supported only if all previously issued updates for this product are also installed.

Restart requirement

After you apply this update, you must perform a clean build of the whole platform. To do this, use one of the following methods:

  • On the Build menu, click Clean Solution, and then click Build Solution.
  • On the Build menu, click Rebuild Solution.
You don't have to restart the computer after you apply this software update.

Update replacement information

This update doesn't replace any other updates.

File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following table. 
Files that are included in this hotfix package
File nameFile sizeDateTimePath
Spnego.map70,37424-Feb-201711:52Public\Common\Oak\Target\X86\Checked
Spnego.dll53,24824-Feb-201711:52Public\Common\Oak\Target\X86\Checked
Spnego.rel21,33424-Feb-201711:52Public\Common\Oak\Target\X86\Checked
Spnego.map45,50924-Feb-201711:52Public\Common\Oak\Target\X86\Retail
Spnego.dll45,05624-Feb-201711:52Public\Common\Oak\Target\X86\Retail
Spnego.rel12,57624-Feb-201711:52Public\Common\Oak\Target\X86\Retail
Spnego.map71,49424-Feb-201711:52Public\Common\Oak\Target\X86\Debug
Spnego.dll73,72824-Feb-201711:52Public\Common\Oak\Target\X86\Debug
Spnego.rel23,97324-Feb-201711:52Public\Common\Oak\Target\X86\Debug
Spnego.map127,98724-Feb-201711:52Public\Common\Oak\Target\Armv7\Checked
Spnego.dll53,24824-Feb-201711:52Public\Common\Oak\Target\Armv7\Checked
Spnego.rel15,65024-Feb-201711:52Public\Common\Oak\Target\Armv7\Checked
Spnego.map81,75224-Feb-201711:52Public\Common\Oak\Target\Armv7\Retail
Spnego.dll45,05624-Feb-201711:52Public\Common\Oak\Target\Armv7\Retail
Spnego.rel8,45824-Feb-201711:52Public\Common\Oak\Target\Armv7\Retail
Spnego.map151,64224-Feb-201711:51Public\Common\Oak\Target\Armv7\Debug
Spnego.dll73,72824-Feb-201711:51Public\Common\Oak\Target\Armv7\Debug
Spnego.rel16,46224-Feb-201711:51Public\Common\Oak\Target\Armv7\Debug

↑ Back to the top


Status

Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.

↑ Back to the top


References

Learn about the terminology that Microsoft uses to describe software updates.

↑ Back to the top


Keywords: kbfix, kbsurveynew, ATdownload, kbExpertiseAdvanced, KbSECBulletin, kbSecurity, kbSecReview

↑ Back to the top

Article Info
Article ID : 4014019
Revision : 6
Created on : 7/21/2017
Published on : 8/17/2018
Exists online : False
Views : 206