Pro SharePoint Server 2019 byla vydána nová kumulativní aktualizace (June 2021 CU).
SP Build:
16.0.10375.20000 (Language independent CU)
16.0.10375.20000 (Language dependent CU)
SharePoint 2019 CU – KB články popisující CU:
- KB 5001944 – June 2021 Update for SharePoint Server 2019 (language independent)
- KB 5001945 – June 2021 Update for SharePoint Server 2019 (language dependent)
- KB 5001943 – June 2021 Update for Office Online Server
SharePoint Server 2019 CU – Odkaz ke stažení CU:
- Download June 2021 Update for SharePoint Server 2019 (language independent)
- Download June 2021 Update for SharePoint Server 2019 (language dependent)
- Download June 2021 Update for Office Online Server
Po dokončení instalace nezapomeňte na spuštění průvodce konfigurací služby SharePoint 2019 (SharePoint 2019 Products Configuration Wizard), nebo příkazu:PSConfig.exe -cmd upgrade -inplace b2b -wait -cmd applicationcontent -install -cmd installfeatures -cmd secureresources -cmd services -install
Upozornění
Vždy instalujte oba balíčky a to v pořadí:
- language independent (aktualizuje jazykové nezávislé komponenty)
- language dependent (aktualizuje jazykové závislé komponenty)
V případě jazykově závislých balíčku (language dependent) nezáleží jaký jazyk si ve výsledku vyberete, jelikož každý balíček obsahuje aktualizace pro všechny jazyky.
V případě, že na SharePoint Server 2019 farmu instalujete nový jazykový balíček, je nutné následně znova nainstalovat jazykové závislý balíček (language dependent).
Nezapomínejte, že krom SharePoint je nutné mít aktualizovanou i službu Distributed Cache, viz. Jak správně aktualizovat Distributed Cache a v případě Office Online Serveru musíte mít aktuální RTM verzi, viz. Jak aktualizovat Office Online Server.
Obsažené opravy a vylepšení
Seznam oprav a vylepšení tohoto CU je soubor výňatků z oficiálních Microsoft KB článků v původním jazyce (EN).
SharePoint Server 2019
This security update resolves a Microsoft SharePoint remote code execution vulnerability, SharePoint spoofing vulnerability, SharePoint Server remote code execution vulnerability, and SharePoint Server information disclosure vulnerability. To learn more about these vulnerabilities, see the following security advisories:
-
Microsoft Common Vulnerabilities and Exposures CVE-2021-26420
-
Microsoft Common Vulnerabilities and Exposures CVE-2021-31948
-
Microsoft Common Vulnerabilities and Exposures CVE-2021-31950
-
Microsoft Common Vulnerabilities and Exposures CVE-2021-31963
-
Microsoft Common Vulnerabilities and Exposures CVE-2021-31964
-
Microsoft Common Vulnerabilities and Exposures CVE-2021-31965
-
Microsoft Common Vulnerabilities and Exposures CVE-2021-31966
This security update contains improvements and fixes for the following nonsecurity issues in SharePoint Server 2019:
-
Fixes a data loss issue that occurs when multiple attachments that have the same name are emailed to a SharePoint list.
-
Fixes an issue in which the link that’s generated by Copy link causes issues when you open or check out the Microsoft 365 (formerly Office 365) client.
-
Fixes an issue in which not all application pools can restart successfully after you install a custom sandbox solution.
-
Fixes an issue in which extensive unnecessary ULS logs are recorded when rendering a page.
This update also contains fixes for the following issues. To fix these issues, you have to install KB 5001945 together with this update.
-
Fixes an issue in which metadata about the Public Update that was stored in the Windows Registry contained nonprintable characters.
-
Removes the engagement log query parameter „e“ from copy links for on-premises because it’s used only in SharePoint Online.
-
Fixes an issue in which the screen reader doesn’t read the text of the Quick links Web Part title that’s given by a user.
-
Fixes an issue in which the screen reader doesn’t read letters when you delete words.
-
Fixes an issue in which the posted news doesn’t appear in the „News“ web part in Internet Explorer by using the list layout.
-
Fixes the role relationship issue at the „Document“ page for accessibility.
-
Fixes an issue in which the ARIA toggle field in a details list doesn’t have an accessible name.
-
Fixes an issue in which New Items under Site Usage in a non-English modern team site counts only .docx files.
This security update also contains a fix for the following nonsecurity issue in Project Server 2019:
When the reporting database refresh is performed, the following OData specific SQL views may be removed and not regenerated as expected:
-
pjrep.MSP_TimesheetLine_ODATAView
-
pjrep.MSP_FiscalPeriods_ODATAView
-
pjrep.MSP_ProjectTimephasedRollupInfo_ODATAView
-
pjrep.MSP_EpmTaskByDay_ODATAView
-
pjrep.MSP_ProjectBaseline_ODATAView
When these views are missing, reports that depend on them fail.
Known issues in this update
-
DataFormWebPart may be blocked from accessing an external URL, and it generates „8scdc“ event tags in SharePoint Unified Logging System (ULS) logs. For more information, see KB 5004210.
-
When third-party assemblies try to access some sensitive properties, user code might be blocked. When this issue occurs, “8gaol” event entries are logged in SharePoint Unified Logging System (ULS) logs. For example, you may find the following entry in ULS logs:
8gaol Unable to access this sensitive property : <sensitive property name> from outer assembly.To fix this issue, install KB5002000 and follow the guidance in KB5004581 to enable trusted third-party assemblies.
Komentáře