This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can trysigning in orchanging directories.
Access to this page requires authorization. You can trychanging directories.
Visual Studio 2017 version 15.9 Release NotesImportant
This is not the latest version of Visual Studio. To download the latest release, please visithttps://visualstudio.microsoft.com/downloads/ and see theVisual Studio 2022 release notes.
Visual Studio 2017 version 15.9 is the final supported servicing baseline for Visual Studio 2017 and has entered theextended support period. Enterprise and Professional customers needing to adopt a long term stable and secure development environment are encouraged to standardize on this version. As explained in more detail in ourlifecycle and support policy, version 15.9 will be supported with security updates through April 2027, which is the remainder of the Visual Studio 2017 product lifecycle.
Because Visual Studio 2017 is now in extended support, alladministrator updates now cover all minor version ranges of the product. This means that allsecurity updates delivered through the Microsoft Update Catalog or Microsoft Endpoint Manager will update the client to the latest secure version of the Visual Studio 2017 product.
.NET Core 2.1 is out of support as of August 21, 2021
Important
released November 11th, 2025
released October 14th, 2025
released August 12th, 2025
The following Windows SDK versions have been removed from the Visual Studio 2017 installer:
If you previously installed one of these versions of the SDK using Visual Studio it will be uninstalled when you update. If your project targets any of these SDKs you may encounter a build error such as:The Windows SDK version 10.0.17763.0 was not found. Install the required version of Windows SDK or change the SDK version in the project property pages or by right-clicking the solution and selecting "Retarget solution".
To resolve this, we recommend retargeting your project to 10.0.19041.0, or an earlier supported version if necessary. For a complete list of supported SDK versions please visit:https://developer.microsoft.com/windows/downloads/sdk-archive/. If you need to install an unsupported version of the SDK, you can find it here:https://developer.microsoft.com/windows/downloads/sdk-archive/index-legacy/.
released July 8th, 2025
released June 10th, 2025
released May 13th, 2025
released April 8th, 2025
released March 11th, 2025
released February 11th, 2025
released January 14th, 2025
released November 12th, 2024
released October 8th, 2024
released September 10th, 2024
CVE-2024-35272 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
released August 13th, 2024
released July 9th, 2024
released June 11th, 2024
released May 14th, 2024
released April 9th, 2024
released to the web on February 13, 2024 and released to Microsoft Update on March 12, 2024
released January 9th, 2024
released on October 10, 2023
released on September 12, 2023
released on August 8, 2023
released on June 13, 2023
released on Apr 11, 2023
released on Mar 14, 2023
released on Feb 14, 2023
git archive,git log --format leading to RCEreleased on November 8, 2022
released on August 9, 2022
released on June 14, 2022
released on May 10, 2022
CVE-2022-29148 Visual Studio Remote Code Execution VulnerabilityA remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.
CVE-2022-24513 Elevation of privilege vulnerabilityA potential elevation of privilege vulnerability exists when the Microsoft Visual Studio updater service improperly parses local configuration data.
released on April 19, 2022
released on April 12, 2022
CVE-2022-24765 Elevation of privilege vulnerabilityA potential elevation of privilege vulnerability exists in Git for Windows, in which Git operations could run outside a repository while seraching for a Git directory. Git for Windows is now updated to version 2.35.2.1.
CVE-2022-24767 DLL hijacking vulnerabilityA potential DLL hijacking vulnerability exists in Git for Windows installer, when running the uninstaller under the SYSTEM user account. Git for Windows is now updated to version 2.35.2.1.
CVE-2022-24513 Elevation of privilege vulnerabilityA potential elevation of privilege vulnerability exists when the Microsoft Visual Studio updater service improperly parses local configuration data.
released on March 8, 2022
CVE-2021-3711 OpenSSL Buffer Overflow vulnerabilityA potential buffer overflow vulnerability exists in OpenSSL, which is consumed by Git for Windows. Git for Windows is now updated to version 2.35.1.2, which addresses this issue.
released on February 8, 2022
CVE-2022-21871 Diagnostics Hub Standard Collector Runtime Elevation of Privilege VulnerabilityAn elevation of privilege vulnerability exists if the Diagnostics Hub Standard Collector incorrectly handles data operations.
released on January 11, 2022
released on December 14, 2021
released on November 09, 2021
CVE-2021-42319 Elevation of Privilege VulnerabilityAn Elevation of Privilege vulnerability exists in the WMI Provider that is included in the Visual Studio installer.
CVE-2021-42277 Diagnostics Hub Standard Collector Service Elevation of Privilege VulnerabilityAn elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector incorrectly handles file operations.
released on October 12, 2021
CVE-2020-1971 OpenSSL Denial of Service VulnerabilityPotential denial of service on OpenSSL library, which is consumed by Git.
CVE-2021-3449 OpenSSL Denial of Service VulnerabilityPotential denial of service on OpenSSL library, which is consumed by Git.
CVE-2021-3450 OpenSSL Potential bypass of the X509_V_FLAG_X509_STRICT flagA potential flag bypass in OpenSSL library, which is consumed by Git.
released on September 14, 2021
CVE-2021-26434 Visual Studio Incorrect Permission Assignment Privilege Escalation VulnerabilityA permission assignment vulnerability exists in Visual Studio after installing the Game development with C++ and selecting the Unreal Engine Installer workload. The system is vulnerable to LPE during the installation it creates a directory with write access to all users.
CVE-2021-36952 Visual Studio Remote Code Execution VulnerabilityA remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.
released on August 10, 2021
CVE-2021-26423 .NET Core Denial of Service Vulnerability
A denial of service vulnerability exists where .NET (Core) server applications providing WebSocket endpoints could be tricked into endlessly looping while trying to read a single WebSocket frame.
CVE-2021-34485 .NET Core Information Disclosure Vulnerability
An information disclosure vulnerability exists when dumps created by the tool to collect crash dumps and dumps on demand are created with global read permissions on Linux and macOS.
CVE-2021-34532 ASP.NET Core Information Disclosure Vulnerability
An information disclosure vulnerability exists in where a JWT token is logged if it cannot be parsed.
released on July 13, 2021
released on May 11, 2021
released on April 13, 2021
CVE-2021-27064 Visual Studio Installer Elevation of Privilege Vulnerability
A remote code execution vulnerability exists when the Visual Studio installer executes the feedback client in an elevated state.
CVE-2021-28313 /CVE-2021-28321 /CVE-2021-28322 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector incorrectly handles data operations.
released on March 09, 2021
CVE-2021-21300 Git for Visual Studio Remote Code Execution Vulnerability
A remote code execution vulnerability exists when Visual Studio clones a malicious repository.
CVE-2021-26701 .NET Core Remote Code Execution Vulnerability
A remote code execution vulnerability exists in .NET 5 and .NET Core due to how text encoding is performed.
released on February 10, 2021
released on February 09, 2021
CVE-2021-1639 TypeScript Language Service Remote Code Execution Vulnerability
A remote code execution vulnerability exists when Visual Studio loads a malicious repository containing JavaScript or TypeScript code files.
CVE-2021-1721 .NET Core Denial of Service Vulnerability
A denial-of-service vulnerability exists when creating HTTPS web request during X509 certificate chain building.
CVE-2021-24112 .NET 5 and .NET Core Remote Code Execution Vulnerability
A remote code execution vulnerability exists when disposing metafiles when a graphics interface still has a reference to it. This vulnerability only exists on systems running on MacOS or Linux.
released on January 12, 2021
CVE-2021-1651 /CVE-2021-1680 Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector incorrectly handles data operations.
CVE-2020-26870 Visual Studio Installer Remote Code Execution Vulnerability
A remote code execution vulnerability exists when the Visual Studio Installer attempts to show malicious markdown.
released on December 08, 2020
CVE-2020-17156 Visual Studio Remote Code Execution Vulnerability
A remote code execution vulnerability exists when Visual Studio clones a malicious repository.
released on November 20, 2020
CVE-2020-17100 Visual Studio Tampering Vulnerability
A tampering vulnerability exists when the Python Tools for Visual Studio creates the python27 folder. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
released on October 13, 2020
released on September 8, 2020
CVE-2020-1130 Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles data operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
CVE-2020-1133 Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
CVE-2020-16856 Visual Studio Remote Code Execution Vulnerability
A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.
CVE-2020-16874 Visual Studio Remote Code Execution Vulnerability
A remote code execution vulnerability exists in Visual Studio when it improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.
CVE-2020-1045 Microsoft ASP.NET Core Security Feature Bypass Vulnerability
A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.
released on August 11, 2020
CVE-2020-1597 ASP.NET Core Denial of Service Vulnerability
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.
released on July 14, 2020
CVE-2020-1393 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Windows Diagnostics Hub Standard Collector Service fails to properly sanitize input, leading to an unsecure library-loading behavior.
CVE-2020-1416 Visual Studio Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists in Visual Studio when it loads software dependencies. A local attacker who successfully exploited the vulnerability could inject arbitrary code to run in the context of the current user.
CVE-2020-1147 .NET Core Denial of Service Vulnerability
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to an ASP.NET Core application, or other application that parses certain types of XML. The security update addresses the vulnerability by restricting the types that are allowed to be present in the XML payload.
released on June 02, 2020
CVE-2020-1202 /CVE-2020-1203Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector or the Visual Studio Standard Collector fails to properly handle objects in memory.
CVE-2020-1293 /CVE-2020-1278 /CVE-2020-1257 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly handles file operations.
CVE-2020-1108 /CVE-2020-1108 /CVE-2020-1108 .NET Core Denial of Service Vulnerability
To comprehensively address CVE-2020-1108, Microsoft has released updates for .NET Core 2.1 and .NET Core 3.1. Customers who use any of these versions of .NET Core should install the latest version of .NET Core. See theRelease Notes for the latest version numbers and instructions for updating .NET Core.
released on May 12, 2020
CVE-2020-1108 .NET Core Denial of Service Vulnerability
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Core application.The security update addresses the vulnerability by correcting how the .NET Core web application handles web requests.
released on April 14, 2020
CVE-2020-0899 Microsoft Visual Studio Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when Microsoft Visual Studio updater service improperly handles file permissions. An attacker who successfully exploited this vulnerability could overwrite arbitrary file content in the security context of the local system.
CVE-2020-0900 Visual Studio Extension Installer Service Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Visual Studio Extension Installer Service improperly handles file operations. An attacker who successfully exploited the vulnerability could delete files in arbitrary locations with elevated permissions.
A credential leak vulnerability exists when specially crafted URLs are parsed and sent to credential helpers. This can lead to credentials being sent to the wrong host.
released on March 10, 2020
[/cpp/build/reference/qspectre-load /Qspectre-load</a> & [/cpp/build/reference/qspectre-load-cf /Qspectre-load-cf</a> for speculative load hardening.CVE-2020-0793 /CVE-2020-0810 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector improperly handles file operations, or the Windows Diagnostics Hub Standard Collector Service fails to properly sanitize input.
CVE-2020-0884 Spoofing vulnerability when creating Outlook Web -Add-in
released on February 11, 2020
released on January 14, 2020
CVE-2020-0602 ASP.NET Core Denial of Service Vulnerability
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the ASP.NET Core application. The security update addresses the vulnerability by correcting how the ASP.NET Core web application handles web requests.
CVE-2020-0603 ASP.NET Core Remote Code Execution Vulnerability
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the ASP.NET Core application. The security update addresses the vulnerability by correcting how the ASP.NET Core web application handles in memory.
released on December 10, 2019
A remote code execution vulnerability exists when Git runs into collisions of submodule names for directories of sibling submodules. An attacker who successfully exploited this vulnerability could remote execute code on the target machine. The security update addresses the vulnerability by taking a new version of Git for Windows which requires the directory for the submodules’ clone to be empty.
A remote code execution vulnerability exists when Git interprets command-line arguments with certain quoting during a recursive clone in conjunction with SSH URLs. An attacker who successfully exploited this vulnerability could remote execute code on the target machine. The security update addresses the vulnerability by taking a new version of Git for Windows which fixes the issue.
An arbitrary file overwrite vulnerability exists in Git when non-letter drive names bypass safety checks ingit clone. An attacker who successfully exploited this vulnerability could write to arbitrary files on the target machine. The security update addresses the vulnerability by taking a new version of Git for Windows which fixes the issue.
A remote code execution vulnerability exists in Git when cloning and writing to .git/ directory via NTFS alternate data streams. An attacker who successfully exploited this vulnerability could remote execute code on the target machine. The security update addresses the vulnerability by taking a new version of Git for Windows which has been made aware of NTFS alternate data streams.
An arbitrary file overwrite vulnerability exists in Git when tree entries with backslashes and malicious symlinks could break out of the work tree. An attacker who successfully exploited this vulnerability could write to arbitrary files on the target machine. The security update addresses the vulnerability by taking a new version of Git for Windows which does not allow this usage of backslashes.
A remote code execution vulnerability exists in Git when cloning recursively with submodules. An attacker who successfully exploited this vulnerability could remote execute code on the target machine. The security update addresses the vulnerability by taking a new version of Git for Windows which tightens validation of submodule names.
released on October 15, 2019
CVE-2019-1425 NPM Package Elevation of Privilege Vulnerability (published November 12, 2019)
An elevation of privilege vulnerability exists when Visual Studio fails to properly validate hardlinks when extracting archived files. The vulnerabilities were introduced by NPM packages used by Visual Studio as described in the following two NPM advisories:npmjs.com/advisories/803 andnpmjs.com/advisories/886. The updated versions of these NPM packages were included in this version of Visual Studio.
released on September 10, 2019
CVE-2019-1232 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly impersonates certain file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. An attacker with unprivileged access to a vulnerable system could exploit this vulnerability. The security update addresses the vulnerability by ensuring the Diagnostics Hub Standard Collector Service properly impersonates file operations.
CVE-2019-1301 Denial of Service Vulnerability in .NET Core
A denial of service vulnerability exists when .NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET Core web application. The vulnerability can be exploited remotely, without authentication.
The update addresses the vulnerability by correcting how the .NET Core web application handles web requests.
released on August 13, 2019
CVE-2019-1211 Git for Visual Studio Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists in Git for Visual Studio when it improperly parses configuration files. An attacker who successfully exploited the vulnerability could execute code in the context of another local user. To exploit the vulnerability, an authenticated attacker would need to modify Git configuration files on a system prior to a full installation of the application. The attacker would then need to convince another user on the system to execute specific Git commands. The update addresses the issue by changing the permissions required to edit configuration files.
released on July 9, 2019
CVE-2019-1075 ASP.NET Core Spoofing Vulnerability
.NET Core updates have released today and are included in this Visual Studio update. This release addresses security and other important issues. Details can be found in the.NET Core release notes.
CVE-2019-1077 Visual Studio Extension Auto Update Vulnerability
An elevation of privilege vulnerability exists when the Visual Studio Extension auto-update process improperly performs certain file operations. An attacker who successfully exploited this vulnerability could delete files in arbitrary locations. To exploit this vulnerability, an attacker would require unprivileged access to a vulnerable system. The security update addresses the vulnerability by securing locations the Visual Studio Extension auto-update performs file operations in.
CVE-2019-1113 WorkflowDesigner XOML deserialization allows code execution
A XOML file referencing certain types could cause random code to be executed when the XOML file is opened in Visual Studio. There is now a restriction on what types are allowed to be used in XOML files. If a XOML file containing one of the newly unauthorized types is opened, a message is displayed explaining that the type is unauthorized.
For further information, please refer tohttps://support.microsoft.com/help/4512190/remote-code-execution-vulnerability-if-types-are-specified-in-xoml.
released on June 11, 2019
released on May 14, 2019
CVE-2019-0727 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly performs certain file operations. An attacker who successfully exploited this vulnerability could delete files in arbitrary locations. To exploit this vulnerability, an attacker would require unprivileged access to a vulnerable system. The security update addresses the vulnerability by securing locations the Diagnostics Hub Standard Collector performs file operations in.
released on April 02, 2019
released on March 25, 2019
released on March 12, 2019
(UWP 6.2.4).CVE-2019-9197 Unity Editor Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the Unity Editor, a 3rd party software that Visual Studio offers to install as part of the Game Development with Unity workload. If you've installed Unity from Visual Studio, please make sure to update the version of Unity you're using to a version that addresses the vulnerability as described in the CVE.The Visual Studio installer has been updated to offer to install a Unity Editor version which addresses the vulnerability.
CVE-2019-0809 Visual Studio Remote Code Execution Vulnerability
A remote code execution vulnerability exists when the Visual Studio C++ Redistributable Installer improperly validates input before loading dynamic link library (DLL) files. An attacker who successfully exploited the vulnerability could execute arbitrary code in the context of the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. To exploit the vulnerability, an attacker must place a malicious DLL on a local system and convince a user to execute a specific executable. The security update addresses the vulnerability by correcting how the Visual Studio C++ Redistributable Installer validates input before loading DLL files.
CVE-2019-0757 .NET Core NuGet Tampering Vulnerability
A tampering vulnerability exists in NuGet software when executed in a Linux or Mac environment. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that an attacker can login as any other user on that machine. At that point, the attacker will be able to replace or add to files that were created by a NuGet restore operation in the current users account.
.NET Core updates have released today and are included in this Visual Studio update. The security update addresses the vulnerability by correcting how NuGet restore creates file permissions for all files extracted to the client machine. Details about the packages can be found in the.NET Core release notes.
released on March 05, 2019
released on February 12, 2019
CVE-2019-0613 WorkflowDesigner XOML deserialization allows code execution
A XOML file referencing certain types could cause random code to be executed when the XOML file is opened in Visual Studio. There is now a restriction on what types are allowed to be used in XOML files. If a XOML file containing one of the newly unauthorized types is opened, a message is displayed explaining that the type is unauthorized.
For further information, please refer toXOML vulnerability documentation
CVE-2019-0657 .NET Framework and Visual Studio Spoofing Vulnerability
.NET Core updates have released today and are included in this Visual Studio update. This release addresses security and other important issues. Details can be found in the.NET Core release notes.
released on January 24, 2019
released on January 08, 2019
AndroidAarLibrary items.(app bug): local reference table overflow(max=512.)]((https://github.com/xamarin/xamarin-android/issues/2257)CVE-2019-0546 Visual Studio Remote Code Execution VulnerabilityA remote code execution vulnerability exists in Visual Studio when the C++ compiler improperly handles specific combinations of C++ constructs. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The security update addresses the vulnerability by correcting how the Visual Studio C++ compiler handles certain C++ constructs.
released on December 11, 2018
CVE-2018-8599 Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Diagnostics Hub Standard Collector Service improperly handles certain file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit this vulnerability, an attacker would require unprivileged access to a vulnerable system. The security update addresses the vulnerability by ensuring the Diagnostics Hub Standard Collector Services properly impersonates file operations.
released on November 28, 2018
released on November 19, 2018
released on November 15, 2018
The Windows 10 October 2018 Update SDK (build 17763) is now the default selected SDK for the Universal Windows Platform development workload.
See all customer-reported issues fixed in Visual Studio 2017 version 15.9.
The Developer Community Portal
released on November 13, 2018
We made it easier to keep your installation settings consistent across multiple installations of Visual Studio. You can now use the Visual Studio Installer to export a .vsconfig file for a given instance of Visual Studio. This file will contain information about what workloads and components you have installed. You can then import this file to add these workload and component selections to another installation of Visual Studio.
We have added support for consuming the new portable-pdb based symbol package format (.snupkg). We have added tooling to make iteasy to consume and manage these symbol packages from sources like the NuGet.org symbol server.
byref values could mutate an immutable value.byref/inref/outref, rather than displaying the previously obscure error.byrefs are now disallowed entirely. They could be declared previously, but were unusable, resulting in a confusing user experience.CompareTo on a struct tuple and causing a type equivalence with an aliased struct tuple would result in a runtime exception.System.Void in the context of authoring a Type Provider for .NET Standard could fail to find theSystem.Void type at design-time.byref types.byref type to a method or function. An error message will now display.byref and a reference type (such asbyref<int> option) would fail at runtime and not emit an error message. We now emit an error message.module global in F# source could cause Visual Studio to become unresponsive.inref<'T> would not show in completion lists.The VisualFSharpFull project is now set as the default startup project, eliminating the need to manually set that before debugging. Thanks,Robert Jeppesen!
We added new templates that allow you to create projects for SharePoint 2019. You will have the ability to migrate existing SharePoint projects from both SharePoint 2013 and SharePoint 2016 to the new project template.
Visual Studio Tools for Xamarin now supports Xcode 10, which allows you to build and debug apps for iOS 12, tvOS 12, and watchOS 5. Seehow to get ready for iOS 12andour introduction to iOS 12for more details on the new features available.
Xamarin.Android 9.1 includesinitial build performance improvements. See ourXamarin.Android 15.8 vs. 15.9 build performance comparison for more details.
This release substantially improves the experience of using authenticated package feeds, especially for Mac and Linux users:
We have introducedNuGet Client Policies which allow you to configure package security constraints. This means you can lock down environments so only trusted packages can be installed by:
Starting with this release, the .NET Core tools for Visual Studio will now default to using only the latest stable version of a .NET Core SDK that is installed on your machine for GA releases of Visual Studio. For future previews, the tools will use only preview .NET Core SDKs.
See all customer-reported issues fixed in Visual Studio 2017 version 15.9.
The Developer Community Portal
See all existing known issues and available workarounds in Visual Studio 2017 version 15.9.
Visual Studio 2017 Known Issues
For more information relating to past versions of Visual Studio 2017, see theVisual Studio 2017 Release Notes History page.