В раздаче
16.11.9
Исправления:
• Fixed an issue with being unable to debug applications multiple times when Windows Terminal is used as the default terminal.
• Setup fix to unblock customers on restricted configurations
• Fixed an issue that prevented a client from being able to update a more current bootstrapper. Once the client is using the bootstrapper and installer that shipped January 2022 or later, all updates using subsequent bootstrappers should work for the duration of the product lifecycle.
• Addressed occasional instance where VSInstr would not exit when instrumenting a binary with volatile metadata causing Instrumentation Profiling to fail.
• Fixed an issue were compiling C++ code with very large functions using /Og or #pragma optimize("g") can generate invalid code (bad codegen)
• Fixed a bug in C++ Concurrency::parallel_for_each that was crashing the calling process due to integer overflow
• Console application runs only once when the Windows Terminal is selected as Default Terminal Application16.11.10
Исправления:
• Fixed an issue that has caused sporadic C++ linker crashes.
• Silent bad codegen issue with x64.
• An issue that prevented files from being deleted while they were being processed by background C++ static analysis.
• Resolved an issue in C++ ATL CString equality operator under C++20 mode.
• Fixed an issue that could have prevented an initializer from running in a load test scenario.
• Missing comparison operators between LPCWSTR and CString in VS 16.11.8
• Fixed x64 optimizer bug from VC++2019 16.11.4
• Fixed Vulnerability A Denial of Service vulnerability exists in .NET 5.0 and .NET 6.0 when the Kestrel web server processes certain HTTP/2 and HTTP/3 requests (CVE-2022-21986)16.11.11
Исправления:
• Fixed an issue with remote debugging, especially affecting Azure App Service, where authentication failures would sometimes fail with 'The connection with the remote endpoint was terminated' and Visual Studio would not prompt for credentials.
• Improved performance on high refresh rate monitors.
• Internal compiler error in fold expression with += operator on 16.11
• consteval constructor and C7595
• cl does not make special member functions implicitly constexpr
• Can't have freestanding requires expressions
• There are no configured extension galleries in VS 2019
• Sql Server object explorer does not show indexes
• SQL project does not build if it has File storage tables
• Fixed Vulnerability A Remote code Execution vulnerability exists in .NET 5.0 and .NET Core 3.1 where a buffer overflow exists in the Brotli library versions prior to 1.0.8 (CVE-2020-8927)
• Fixed Vulnerability A denial of service vulnerability exists in .NET 6.0, .NET 5.0, and .NET CORE 3.1 when parsing certain types of http form requests (CVE-2022-24464)
• Fixed Vulnerability A Remote Code Execution vulnerability exists in .NET 6.0, .NET 5.0, and .NET Core 3.1 where a stack buffer overrun occurs in .NET Double Parse routine (CVE-2022-24512)
• Fixed OpenSSL Buffer Overflow vulnerability A potential buffer overflow vulnerability exists in OpenSSL, which is consumed by Git for Windows. Git for Windows is now updated to version 2.35.1.2, which addresses this issue (CVE-2021-3711)16.11.12
Исправления:
• Fixed an issue that would cause some animations for test execution to run in the background even when the associated test executions were complete. This causes slowdowns that were especially noticeable on high refresh rate monitors. The fix should improve the experience of using VS on high refresh rate monitors.
• Removed an unnecessary warning when connecting to a LiveShare server that didn't offer certain functionality used by the client.
• Optimized Qt applications crash on startup on ARM64
• I get an error Live Share: The user of the output channel works with limited functionality due to the absence of a dependent service.
• Find in IVsTextImage does not work in VisualStudio 2019
• Fixed Elevation of privilege vulnerability A potential elevation of privilege vulnerability exists in Git for Windows, in which Git operations could run outside a repository while seraching for a Git directory. Git for Windows is now updated to version 2.35.2.1 (CVE-2022-24765)
• Fixed DLL hijacking vulnerability A potential DLL hijacking vulnerability exists in Git for Windows installer, when running the uninstaller under the SYSTEM user account. Git for Windows is now updated to version 2.35.2.1 (CVE-2022-24767)
• Fixed Elevation of privilege vulnerability A potential elevation of privilege vulnerability exists when the Microsoft Visual Studio updater service improperly parses local configuration data (CVE-2022-24513)16.11.13
Исправления:
• Fixed vctip.exe regression from 16.11.12
• Fixed a bug that prevented some applications built with Address Sanitizer (ASAN) to load in Windows 11.
• Fixed another ASAN issue where multi-threaded applications with heap contention may experience deadlocks, false "wild pointer freed" reports, or a deadlock during process exit.