This month, we are releasing fixes that impact our self-hosted product, Azure DevOps Server.
The following will be fixed with this patch:
- Resolve issue with newly added AD identities not appearing in security dialog identity pickers.
- Fix an issue with “Requested by Member of Group” filter in the web hook settings.
- Fix Gated check-in builds error when the Organization settings for pipeline had job authorization scope configured as Limit job authorization scope to current project for non-release pipelines.
- Fix retrieving access token from Azure when establishing service connection behind authenticated proxy.
Azure DevOps Server 2020.1.2 Patch 3
If you have Azure DevOps Server 2020.1.1, you should first update to Azure DevOps Server 2020.1.2. Once on Update 1.2, install Azure DevOps Server 2020.1.2 Patch 3. Check out the release notes for more details.
Verifying Installation
- Run
devops2020.1.2patch3.exe CheckInstall
,devops2020.1.2patch3.exe
is the file that is downloaded from the link above. The output of the command will either say that the patch has been installed, or that it is not installed.
Azure DevOps Server 2020.0.2 Patch 1
If you have Azure DevOps Server 2020.0.1, you should first update to Azure DevOps Server 2020.0.2. Once on Update 2020.0.2, install Azure DevOps Server 2020.0.2 Patch 1. Check out the release notes for more details.
Verifying Installation
- Run
devops2020.0.2patch1.exe CheckInstall
,devops2020.0.2patch1.exe
is the file that is downloaded from the link above. The output of the command will either say that the patch has been installed, or that it is not installed.
I wonder if there is any information available in connecting to the openSSL vulnerability CVE-2022-3358, CVE-2022-3786 and CVE-2022-3602
A file search on our App/Data tier reveals the following files but no mention of versions used:
C:\Program Files\Azure DevOps Server 2020\Version Control Proxy\MinGit\mingw64\share\licenses\openssl\LICENSE
C:\Program Files\Azure DevOps Server 2020\Version Control Proxy\MinGit\mingw64\ssl\openssl.cnf
C:\Program Files\Azure DevOps Server 2020\Version Control Proxy\MinGit\usr\share\licenses\openssl\LICENSE
C:\Program Files\Azure DevOps Server 2020\Version Control Proxy\MinGit\usr\ssl\openssl.cnf
Also asked here: https://developercommunity.visualstudio.com/t/OpenSSL-and-potential-vulnerability-CVE-/10192379
I’ve inherited an instance of ADS that was installed from the 10/6/2020 ADS 2020 RTW release (https://devblogs.microsoft.com/devops/azure-devops-server-2020-rtw-now-available/). The ADS admin console for my instance shows 18.170.305.25.1
What is the patch, or series of patches, that I need to install to get current?
thank-you
Hi William, you should update to Azure DevOps Server 2020.0.2 and then apply Patch 1. You can see changes that we released with Azure DevOps Server 2020.0.2 in the release notes.
Thank-you. Question, though: The release notes for the 2020.0.2 update say that the “Data migration tool will be available for ADS 2020.0.2 about three weeks after this release, but it says nothing about the tool. What scenario/situation is the tool for?
The data migration tool provides a way to migrate collection databases from Azure DevOps Server to Azure DevOps Services. You can find details about the tool in this link
Happy to know about Azure DevOps Server, very much excited for this.
Any plan for Azure DevOps Server 2022.RC2 ?
Hi Quintos. Planning to release late October – early November.
The same question!
Hi Francisco. Planning to release late October – early November.