Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Security update for Windows Embedded Compact 2013: December 2019


View products that this article applies to.

Summary

This article describes a security update for Windows Embedded Compact 2013. This update resolves the security issue that is described in the following article:

Before you install this update, all previously issued updates for this product must be installed.

↑ Back to the top


Software update information

Download information

Windows Embedded Compact 2013 Monthly Update (December 2019) is now available from Microsoft. To download this Windows Embedded Compact 2013 monthly update, go to the Device Partner Center (DPC).

Prerequisites

This update is supported only if all previously issued updates for this product have also been installed.

Restart requirement

After you apply this update, you must perform a clean build of the whole platform. To do this, use one of the following methods:

  • On the Build menu, click Clean Solution, and then click Build Solution.
  • On the Build menu, click Rebuild Solution.

You do not have to restart the computer after you apply this software update.

Update replacement

This update does not replace any other updates.

File information

Files that are included in this update package

The English version of this software update package has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.

File name File version File size Date Time Path
Spbase.lib Not Applicable 2,178,062 09-Dec-2019 10:48 Public\Common\Oak\Lib\Armv7\Checked
Spbase.lib Not Applicable 2,367,996 09-Dec-2019 10:47 Public\Common\Oak\Lib\Armv7\Debug
Spbase.lib Not Applicable 1,411,926 09-Dec-2019 10:50 Public\Common\Oak\Lib\Armv7\Retail
Spbase.lib Not Applicable 2,300,980 09-Dec-2019 10:51 Public\Common\Oak\Lib\X86\Checked
Spbase.lib Not Applicable 2,072,944 09-Dec-2019 10:49 Public\Common\Oak\Lib\X86\Debug
Spbase.lib Not Applicable 1,600,274 09-Dec-2019 10:47 Public\Common\Oak\Lib\X86\Retail
Schannel.dll Not Applicable 331,776 09-Dec-2019 10:50 Public\Common\Oak\Target\Armv7\Checked
Schannel.map Not Applicable 826,251 09-Dec-2019 10:50 Public\Common\Oak\Target\Armv7\Checked
Schannel.rel Not Applicable 117,353 09-Dec-2019 10:50 Public\Common\Oak\Target\Armv7\Checked
Schannel.dll Not Applicable 430,080 09-Dec-2019 10:49 Public\Common\Oak\Target\Armv7\Debug
Schannel.map Not Applicable 910,218 09-Dec-2019 10:49 Public\Common\Oak\Target\Armv7\Debug
Schannel.rel Not Applicable 117,701 09-Dec-2019 10:49 Public\Common\Oak\Target\Armv7\Debug
Schannel.dll Not Applicable 139,264 09-Dec-2019 10:52 Public\Common\Oak\Target\Armv7\Retail
Schannel.map Not Applicable 288,037 09-Dec-2019 10:52 Public\Common\Oak\Target\Armv7\Retail
Schannel.rel Not Applicable 29,251 09-Dec-2019 10:52 Public\Common\Oak\Target\Armv7\Retail
Schannel.dll Not Applicable 360,448 09-Dec-2019 10:52 Public\Common\Oak\Target\X86\Checked
Schannel.map Not Applicable 411,355 09-Dec-2019 10:52 Public\Common\Oak\Target\X86\Checked
Schannel.rel Not Applicable 222,043 09-Dec-2019 10:52 Public\Common\Oak\Target\X86\Checked
Schannel.dll Not Applicable 471,040 09-Dec-2019 10:51 Public\Common\Oak\Target\X86\Debug
Schannel.map Not Applicable 417,851 09-Dec-2019 10:51 Public\Common\Oak\Target\X86\Debug
Schannel.rel Not Applicable 249,941 09-Dec-2019 10:51 Public\Common\Oak\Target\X86\Debug
Schannel.dll Not Applicable 159,744 09-Dec-2019 10:48 Public\Common\Oak\Target\X86\Retail
Schannel.map Not Applicable 149,004 09-Dec-2019 10:48 Public\Common\Oak\Target\X86\Retail
Schannel.rel Not Applicable 50,972 09-Dec-2019 10:48 Public\Common\Oak\Target\X86\Retail

↑ Back to the top


References

Learn about the terminology that Microsoft uses to describe software updates.

↑ Back to the top


Keywords: kbsecvulnerability, kbsecurity, kbsecreview, kbsecbulletin, kbmustloc, kblangall, kbbug, ATdownload, kbExpertiseAdvanced, kbsurveynew, kbfix

↑ Back to the top

Article Info
Article ID : 4528564
Revision : 9
Created on : 1/15/2020
Published on : 1/15/2020
Exists online : False
Views : 145