Microsoft Windows Security Updates August 2022 overview

Martin Brinkmann
Aug 9, 2022
Windows Updates
|
19

Microsoft released security and non-security updates for all supported client and server versions of the Windows operating system on the August 2022 Patch Day.

microsoft windows august 2022 updates security

The updates are available already via Windows Update and other update management services. While they do get installed automatically on most Home systems eventually, some administrators may want to download them as early as possible.  All of the security updates that Microsoft releases are cumulative; they include previous updates.

Our patch overview for the Windows August 2022 Patch Tuesday is created as a reference for system administrators and home users alike. It lists important information about the released patches, includes links to support pages and direct downloads, lists known issues and includes a listing of non-security updates that Microsoft released.

Tip: check out the July 2022 Windows Update overview for last month's releases.

Microsoft Windows Security Updates: August 2022

The following Excel spreadsheet includes the released security updates for Windows and other company products. Just download it with a click on the following link:  Microsoft Windows security updates august 2022

Executive Summary

  • Microsoft released security updates for all supported client and server versions of the Windows operating system.
  • Security updates are also available for .Net Core, Azure, Microsoft Office, Microsoft Windows Support Diagnostic Tool, Visual Studio and other company products.
  • Security update KB5012170 addresses a vulnerability in Secure Boot DBX.
  • The following client versions of Windows have known issues: Windows 7, Windows 10 version 20H2, 21H1 and 21H2, Windows 11
  • The following server versions of Windows have known issues: Windows Server 2008, 2008 R2, 2019, 2022 and Server 20H2.

Operating System Distribution

  • Windows 7 (extended support only): 29 vulnerabilities: 9 critical and 20 important
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35753
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35767
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35752
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35745
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-35744
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34714
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34702
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-34691
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-30133
  • Windows 8.1: 39 vulnerabilities: 10 critical and 29 important
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35753
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35767
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35752
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35745
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-35744
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34714
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34702
    • Windows Hyper-V Remote Code Execution Vulnerability -- CVE-2022-34696
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-34691
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-30133
  • Windows 10 version 20H2, 21H1 and 21H2 : 58 vulnerabilities, 12 critical and 46 important
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35766
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35794
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35767
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35753
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35752
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35745
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-35744
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34714
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34702
    • Windows Hyper-V Remote Code Execution Vulnerability -- CVE-2022-34696
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-34691
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-30133
  • Windows 11:  54 vulnerabilities, 13 critical and 41 important
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35766
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35794
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35767
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35753
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35752
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35745
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-35744
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34714
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34702
    • Windows Hyper-V Remote Code Execution Vulnerability -- CVE-2022-34696
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-34691
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-30133
    • SMB Client and Server Remote Code Execution Vulnerability -- CVE-2022-35804

Windows Server products

  • Windows Server 2008 R2 (extended support only): 29 vulnerabilities: 9 critical and 20 important
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35753
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35767
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35752
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35745
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-35744
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34714
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34702
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-34691
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-30133
  • Windows Server 2012 R2: 398 vulnerabilities: 4 critical and 34 important
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35753
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35767
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35752
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35745
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-35744
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34714
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34702
    • Windows Hyper-V Remote Code Execution Vulnerability -- CVE-2022-34696
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-34691
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-30133
  • Windows Server 2016: 51 vulnerabilities: 10 critical and 41 important
    • same as Windows Server 2012 R2
  • Windows Server 2019: 56 vulnerabilities: 12 critical and 44 important
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35766
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35794
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35767
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35753
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35752
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-35745
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-35744
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34714
    • Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability -- CVE-2022-34702
    • Windows Hyper-V Remote Code Execution Vulnerability -- CVE-2022-34696
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-34691
    • Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability -- CVE-2022-30133
  • Windows Server 2022:  57 vulnerabilities: 12 critical and 45 important
    • same as Windows Server 2019

Windows Security Updates

Windows 7 SP1 and Windows Server 2008 R2

Updates and improvements:

  • Fixed Speech and Network troubleshooters not starting when launched.
  • Fixed an issue that could make Local Security Authority Server Service to leak tokens.
    • This issue affects devices that have installed Windows updates dated June 14, 2022 or later. This issue occurs when the device performs a specific form of service for user (S4U) in a non-Trusted Computing Base (TCB) Windows service that runs as Network Service.
  • Update enforces a hardware change that "that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of RFC 4556".
    • If they do not comply, Active Directory domain controllers will not authenticate them. Mitigations that allowed non-compliant devices to authenticate will not exist after August 9, 2022. See KB5004508 for more information.

Windows 8.1 and Windows Server 2012 R2

Updates and improvements:

  • Same as those listed under Windows 7 above

Windows 10 version 20H2, 21H1 and 21H2

Updates and improvements:

  • Fixed an issue that could make Local Security Authority Server Service to leak tokens.
  • Fixed an issue that caused the creation of duplicate print queues.
  • Fixed an issue that prevented the Input indicator and Language Bar from being displayed in the notification area.
  • Plus everything listed on the preview update changelog page.

Windows 11

Updates and improvements:

  • Fixed an issue that could prevent the opening of the Start Menu.
  • Plus everything listed on the preview update changelog page.

Other security updates

2022-08 Security Update for Windows 11, Windows 10 Version 21H1, Windows Server, version 20H2, Windows 10 Version 20H2, Windows 10 Version 2004, Windows 10 Version 1909, Windows 10 Version 1903, Windows Server 2019, Windows 10 Version 1809, Windows Server 2016, Windows 10 Version 1607, Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows Embedded 8 Standard, and Windows Server 2012 (KB5012170)

2022-08 Cumulative Security Update for Internet Explorer (KB5016618)

2022-08 Cumulative Update for Windows 10 Version 1507 (KB5016639)

Server updates

2022-08 Security Monthly Quality Rollup for Windows Server 2008 (KB5016669)

2022-08 Security Only Quality Update for Windows Server 2008 (KB5016686)

2022-08 Security Only Quality Update for Windows Embedded 8 Standard and Windows Server 2012 (KB5016684)

2022-08 Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012 (KB5016672)

2022-08 Cumulative Update for Windows Server 2016 and Windows 10 Version 1607 (KB5016622)

2022-08 Cumulative Update for Windows Server 2019 and Windows 10 Version 1809 (KB5016623)

2022-08 Cumulative Update for Microsoft server operating system version 21H2 for x64-based Systems (KB5016627)

Servicing Stack Updates

2022-08 Servicing Stack Update for Windows Server 2016 and Windows 10 Version 1607 (KB5017095)

Known Issues

Windows 7 SP1 and Windows Server 2008 R2

  • (Old) Updates may show as failed and may be uninstalled because the machine is not on ESU.
    • Expected behaviour.
  • (Fixed) Certain operations such as rename may fail on Cluster Shared Volumes.
    • Perform the operation from a process with administrator privileges.
    • Perform the operation from a node that does not have CSV ownership.

Windows 8.1 and Windows Server 2012 R2

  • (Fixed) Certain operations such as rename may fail on Cluster Shared Volumes.
    • Perform the operation from a process with administrator privileges.
    • Perform the operation from a node that does not have CSV ownership.

Windows 10 versions 20H2, 21H1 and 21H2

  • (Old) Custom installations may not receive the new Microsoft Edge web browser, while the old version may be removed.
  • (Fixed) Some devices can't install updates after installation of KB5003690 (June 21, 2021). Error PSFX_E_MATCHING_BINARY_MISSING is displayed.
    • Workaround instructions are available here.
  • (Old) IE Mode tabs might stop responding in Microsoft Edge when sites display modal dialogs.
    • Microsoft resolved the issue with a Known Issue Rollback, which may take up to 24 hours to propagate.
  • Some printing devices may have issues after installation of the update. These may include duplicate copies of printers installed on a device and problems when printing from applications that refer to a printer by a specific name.
    • View the “Settings” app on your device. If a duplicate copy of a printer appears to exist under the “Bluetooth & devices” section, confirm whether this printer works. If so, this printer can be used normally, and other copies of the printer can be removed.

      If the issue persists, update the print driver for your device.

Windows 11

  • (Fixed) Some .NET 3.5 Framework apps may fail to open or may have issues.
    • Mitigate the issue by "re-enabling .NET Framework 3.5 and the Windows Communication Foundation in Windows Features". See this support page for instructions.
    • (Old) IE Mode tabs might stop responding in Microsoft Edge when sites display modal dialogs.
      • Microsoft resolved the issue with a Known Issue Rollback, which may take up to 24 hours to propagate.

Security advisories and updates

ADV 990001 -- Latest Servicing Stack Updates

Non-security updates

2022-08 Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 21H1, Windows Server, version 20H2, Windows 10 Version 20H2, Windows 10 Version 2004, Windows 10 Version 1909, Windows 10 Version 1903, Windows 10 Version 1809, and Windows 10 Version 1607 (KB5015730)

2022-08 Security and Quality Rollup for .NET Framework 3.5.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2 (KB5016738)

2022-08 Security and Quality Rollup for .NET Framework 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded 8 Standard and Windows Server 2012 (KB5016739)

2022-08 Security and Quality Rollup for .NET Framework 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 8.1 and Windows Server 2012 R2 (KB5016740)

2022-08 Security and Quality Rollup for .NET Framework 2.0, 3.0, 4.6.2 for Windows Server 2008 (KB5016741)

2022-08 Cumulative Update for .NET Framework 4.8 for Windows Server 2016 and Windows 10 Version 1607 (KB5016373)

2022-08 Cumulative Update for .NET Framework 3.5, 4.7.2 and 4.8 for Windows Server 2019 and Windows 10 Version 1809 (KB5016737)

Microsoft Office Updates

You find Office update information here.

How to download and install the August 2022 security updates

Unmanaged Windows devices are configured to download important security updates automatically. While it is possible to make changes to the default configuration, most updates that fall into the group are downloaded automatically.

Organizations may use update management systems such as WSUS to distribute updates.

Do the following to run a manual check for updates:

  1. Select Start, type Windows Update and load the Windows Update item that is displayed.
  2. Select check for updates to run a manual check for updates.

Direct update downloads

Below are resource pages with direct download links, if you prefer to download the updates to install them manually.

Windows 7 and Server 2008 R2

  • KB5016676 -- 2022-08 Security Monthly Quality Rollup for Windows 7
  • KB5016679 -- 2022-08 Security Only Quality Update for Windows 7

Windows 8.1 and Windows Server 2012 R2

  • KB5016681 -- 2022-08 Security Monthly Quality Rollup for Windows 8.1
  • KB5016683 -- 2022-08 Security Only Quality Update for Windows 8.1

Windows 10 (version 20H2)

  • KB5016616 -- 2022-08 Cumulative Update for Windows 10 Version 20H2

Windows 10 (version 21H1)

  • KB5016616 -- 2022-08 Cumulative Update for Windows 10 Version 21H1

Windows 10 (version 21H2)

  • KB5016616 -- 2022-08 Cumulative Update for Windows 10 Version 21H2
Windows 11
  • KB5016629  -- 2022-08 Cumulative Update for Windows 11

Additional resources

Summary
Microsoft Windows Security Updates August 2022 overview
Article Name
Microsoft Windows Security Updates August 2022 overview
Description
Microsoft released security and non-security updates for all supported client and server versions of the Windows operating system on the August 2022 Patch Day.
Author
Publisher
Ghacks Technology News
Logo
Advertisement

Previous Post: «
Next Post: «

Comments

  1. Mothy said on August 12, 2022 at 11:30 pm
    Reply

    No issues after installing the Monthly Rollup (KB5016681) on two Windows 8.1 Pro desktops. The End of Support (EOS) notification tasks remain disabled (as reported in last month’s July updates).

    The Security update for Secure Boot DBX (KB5012170) did show up in Windows Update. But I don’t use or need the feature so I did not install it (instead right click and hide it).

  2. Anonymous said on August 11, 2022 at 2:40 am
    Reply

    I have configured a day delay before installing updates.

    I was checking to see if it checked for updates today, and looked at the update history.
    It installed an update KB5012170 yesterday.

    Interestingly, my computer was acting weirdly and crashed yesterday.
    I never saw evidence that it downloaded the update, or warned of a reboot.

    I running 21H1. It didn’t install KB5016616 yet.

  3. ryegrass said on August 10, 2022 at 8:22 pm
    Reply

    I haven’t seen any indication that Microsoft is aware that July updates broke Windows Media Center by installing a broken ehtrace.dll since that was not listed as a known problem last month, and August’s update did not address or repair the problem (for those of us still using such an old application).

    1. smarti3 said on August 13, 2022 at 11:08 pm
      Reply

      ryegrass: thanks for pointing this out — Microsoft team PLEASE fix this before Septembers updates!!!

      1. ryegrass said on August 15, 2022 at 6:55 am
        Reply

        @smarti3

        One of the reasons for posting here was the hope that someone who is able to contact Microsoft could at least let them know there’s problem.

  4. TelV said on August 10, 2022 at 4:00 pm
    Reply

    @ Martin,

    Thanks once again for all the hard work.

  5. Ghdor said on August 10, 2022 at 3:26 pm
    Reply

    When the internet Explorer removal official Microsoft tool?

  6. Martin P. said on August 10, 2022 at 3:13 pm
    Reply

    @Dave

    “ Totaly agree. pure irony.”

    Makes me wish Microsoft does extend support for Windows 7 for another 3 years…

    (Remove … to make the link work)

    https:/…/www.ghacks.net/2022/07/15/it-looks-as-if-microsoft-could-extend-windows-7-support-by-three-years/

    1. NeonRobot said on August 11, 2022 at 10:40 am
      Reply

      Even if appointed fact will not happen. POS version is supported up to late 2024.

  7. dave said on August 10, 2022 at 12:01 pm
    Reply

    I suspect that at some point Win7 automatically become less insecure due to small market share and lesser reasons to attack it. And win11 will eventually become main target for hackers.

    Totally agree. Pure irony.

    1. Iron Heart said on August 10, 2022 at 4:52 pm
      Reply

      @dave

      No, because a range of exploits working on newer Windows versions will also work on Windows 7.

      1. NeonRobot said on August 10, 2022 at 7:10 pm
        Reply

        Arguable. New “hacker” stuff most likely will require windows to support modern and very high level frameworks, which obviously wont work on Win7.
        Resulting in “not a valid win32 application” or “nonexistent exe endpoint” error messages.

  8. NeonRobot said on August 10, 2022 at 10:23 am
    Reply

    I suspect that at some point Win7 automatically become less insecure due to small market share and lesser reasons to attack it. And win11 will eventually become main target for hackers.

  9. Blutarszky said on August 10, 2022 at 9:19 am
    Reply

    Whoa, that’s a whole lot of critical issues again for every Windows version… Kinda makes you bummed out, knowing that you’ve been sailing with a boat smack full of holes for a few weeks again.

  10. M$ backdoors, always delightful! said on August 10, 2022 at 7:20 am
    Reply

    Hahahahahahahah!

    Just look at the number of “Remote Code Execution Vulnerability” bugs! The list just keeps on growing! Every version of Windows is full of these.

  11. Flyer said on August 10, 2022 at 12:04 am
    Reply

    Heh newer system = more vulnerabilities ;)
    As usual. Interesting :P

  12. Paul(us) said on August 9, 2022 at 10:02 pm
    Reply

    Thanks, Ghacks.net/Martin Brinkman for helping me comprehend what I was doing while I was updating, to the Windows 10 pro version 21H2, O.S. build 19044.1889

    1. chesscanoe said on August 10, 2022 at 1:44 am
      Reply

      After running the Patch Tuesday changes for my Windows 10 x64 home laptop, Belarc shows I am at 21H2 19044.1889 and confirmed by WINVER.

      1. Peterc said on August 10, 2022 at 6:59 am
        Reply

        @chesscanoe:

        Interesting; I’d never thought to check build numbers in Belarc after updating (or anywhere else, for that matter).

        Typically, Belarc doesn’t update its database with new Patch Tuesday updates until Wednesday afternoon at the earliest (US Pacific Time), and sometimes not until Thursday. Unless there is some super-critical, widely exploited zero-day vulnerability that’s being patched, I usually hold off on updating *at least* until Belarc has updated its database, and if there are reports of update “issues” that might affect me, for longer than that.

        But Belarc Advisor is a useful little utility. I maintain a small depth of versioned backups of the computer profiles it generates using AutoVer. I run Belarc just before I update, and once again after I update, and if it doesn’t give me a clean bill of health after updating and I suspect a false positive, well, I have “before” and “after” profiles to send to Belarc’s engineers. (Plus, I appreciate being reminded about stuff like my Pale Moon Silverlight plug-in’s being end-of-life and insecure!)

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.