Pro SharePoint Server 2019 byla vydána nová kumulativní aktualizace (November 2019 CU).
SP Build:
16.0.10352.20000 (Language independent CU)
16.0.10352.20000 (Language dependent CU)
SharePoint 2019 CU – KB články popisující CU:
- KB 4484142 – November 2019 Update for SharePoint Server 2019 (language independent)
- KB 4484149 – November 2019 Update for SharePoint Server 2019 (language dependent)
- Tento CU neobsahuje aktualizaci pro Office Online Server
SharePoint Server 2019 CU – Odkaz ke stažení CU:
- Download November 2019 Update for SharePoint Server 2019 (language independent)
- Download November 2019 Update for SharePoint Server 2019 (language dependent)
- Tento CU neobsahuje aktualizaci pro Office Online Server
Po dokončení instalace nezapomeňte na spuštění průvodce konfigurací služby SharePoint 2019 (SharePoint 2019 Products Configuration Wizard), nebo příkazu:
PSConfig.exe -cmd upgrade -inplace b2b -wait -cmd applicationcontent -install -cmd installfeatures -cmd secureresources -cmd services -install
Upozornění
Vždy instalujte oba balíčky a to v pořadí:
- language independent (aktualizuje jazykové nezávislé komponenty)
- language dependent (aktualizuje jazykové závislé komponenty)
V případě jazykově závislých balíčku (language dependent) nezáleží jaký jazyk si ve výsledku vyberete, jelikož každý balíček obsahuje aktualizace pro všechny jazyky.
V případě, že na SharePoint Server 2019 farmu instalujete nový jazykový balíček, je nutné následně znova nainstalovat jazykové závislý balíček (language dependent).
Nezapomínejte, že krom SharePoint je nutné mít aktualizovanou i službu Distributed Cache, viz. Jak správně aktualizovat Distributed Cache a v případě Office Online Serveru musíte mít aktuální RTM verzi, viz. Jak aktualizovat Office Online Server.
Obsažené opravy a vylepšení
Seznam oprav a vylepšení tohoto CU je soubor výňatků z oficiálních Microsoft KB článků v původním jazyce (EN).
SharePoint Server 2019
This security update resolves an information disclosure vulnerability that exists in Microsoft SharePoint if an attacker uploads a specially crafted file to the SharePoint Server. To learn more about the vulnerability, see the following security advisories:
- Microsoft Common Vulnerabilities and Exposures CVE-2019-1442
- Microsoft Common Vulnerabilities and Exposures CVE-2019-1443
Summary
This security update resolves an information disclosure vulnerability that exists in Microsoft SharePoint if an attacker uploads a specially crafted file to the SharePoint Server. To learn more about the vulnerability, see the following security advisories:
- Microsoft Common Vulnerabilities and Exposures CVE-2019-1442
- Microsoft Common Vulnerabilities and Exposures CVE-2019-1443
Note To apply this security update, you must have the release version of Microsoft SharePoint Server 2019 installed on the computer.
Improvements and fixes
- Corrects some regional settings display names.
- Fixes an issue in which you can’t download results or reports in an eDiscovery site.
- Corrects an issue in which certain HTTP headers are malformed in responses from SharePoint.
- Corrects an issue in which Publishing Cache items are missing page field data after the IIS app pool restarts.
- Corrects a „date out of range“ exception when a user exports and then imports the site collection while Document ID feature is active.
- Fixes an issue in which the Product Version Timer Job fails on dedicated Search and Distributed Cache Servers.
- Fixes an issue in which the web part displays no content if users visit a Content Search Web Part (CSWP) from the Google’s page viewer or set the AlwaysRenderOnServer boolean in a Content Search Web Part (CSWP) to True.
- When you have a Cloud Search Service Application (Cloud SSA) configured in SharePoint Server 2019, searches within the context of a list or library do not return any results.
- Consider the following scenario:
- A user tries to access a host name site collection and is prompted to sign in.
- A host name site collection is deleted while the user’s session is still active.
In this scenario, the user receives an „Access Denied“ message on all subsequent attempts to access any other site collections by using that web application until they begin a new session.
This issue is now resolved. The fix can be enabled on the server by running the following commands:
$config = Get-SPSecurityTokenServiceConfig $config.WindowsModeIgnoreCache = $true $config.Update()
- When the Schedule Variance Percentage (SVP) or Cost Variance Percentage (CVP) earned value becomes very large, an overflow condition occurs. This causes the client-side object model (CSOM) or REST calls that are made while accessing the project to fail. The SVP and CVP values now have a lower limit of -100% and upper limit of 100%.
- After this update is installed, you can receive information about any type kind of completed queue jobs for a project when you use the new GetAll() method from a REST call.
- Consider the following scenario:
- You create a new project in Project Web App.
- When the schedule project detail page appears, the Project Summary Task is visible.
In this situation, you cannot type in the Task Name field to create a new task.
- Consider the following scenario:
- As a timesheet user, you open your timesheet.
- On an assignment that has no actual work, you enter actual work on a given date.
- You save the timesheet.
- You change your mind, and you remove the actual work that you previously entered.
- You send the timesheet or status update for approval.
- The status manager approves the update.
In this scenario, when the assignment is viewed in Project Professional, it has an actual start date set even though you removed the actual work in the timesheet, and this also removed the actual start date. This fix correctly removes the assignment’s actual start date in this situation.
Komentáře