Ivanti Patch News Bulletin: Microsoft has Released KB3191941 update for Project 2013. 06-JUN-2017

Version 1

    Ivanti Security and Patch News  

     

    Headlines

           (June 9, 2017) KB3191941 update for Project 2013 has been released by Microsoft.    
    Improvements and fixes

    • Translates some terms in multiple languages to make sure that the meaning is accurate.
    • Pasting into the Resource Names field within the Task Usage view allows you to paste the same resource name more than once. This creates a duplicate and causes problems when you apply status updates from Project Server.

           This update fixes the following issues:

    • When you open an XML file that has timephased baseline data in Project 2013, the timephased data appears incorrectly. For example, on Saturday, the timephased baseline work should appear as 0.9h, but it instead appears as 0.88h.
    • When you open a project from Project Server, you incorrectly see the following error message:
    • This project cannot be opened in read-write mode because a previous project checkin for this project is not complete.
    • When you open a .mpp file from a network location that has high latency, it takes a long time to open the file.

           Consider the following:

    • A project manager publishes a task to a team member.
    • The team member in either a timesheet or in tasks within Project Web App reports work that's earlier than what was scheduled. For example, 8h of work was scheduled on Wednesday but 8h of actual work was reported and submitted for Monday.
    • The status manager approves the update.
    • The team member zeros out the actual work and moves it to a later date.
    • The status manager approves the update.
    • The project is opened in Project Server.
    • In this situation, the task's actual start date still reflects the set with the earlier update instead of the new update where the actual start date is later.

        

    Please visit the following page for more details:
        

     

    New Vulnerabilities  

    • Vulnerability ID – 3191941_INTL  

     

    Changed Vulnerabilities  

    • Vulnerability ID – 2956091_INTL (Added the replacement information.)   
    • Vulnerability ID - 2956187_INTL (Added the replacement information.)
    • Vulnerability ID - 2965279_INTL (Added the replacement information.)
    • Vulnerability ID - 2986246_INTL (Added the replacement information.)
    • Vulnerability ID - 3054830_INTL (Added the replacement information.)
    • Vulnerability ID - 3054956_INTL (Added the replacement information.)
    • Vulnerability ID - 3055022_INTL (Added the replacement information.)
    • Vulnerability ID - 3085510_INTL (Added the replacement information.)
    • Vulnerability ID - 3085590_INTL (Added the replacement information.)
    • Vulnerability ID - 3114366_INTL (Added the replacement information.)
    • Vulnerability ID - 3114510_INTL (Added the replacement information.)
    • Vulnerability ID - 3114739_INTL (Added the replacement information.)
    • Vulnerability ID - 3114843_INTL (Added the replacement information.)
    • Vulnerability ID - 3114954_INTL (Added the replacement information.)
    • Vulnerability ID - 3115040_INTL (Added the replacement information.)
    • Vulnerability ID - 3115164_INTL (Added the replacement information.)
    • Vulnerability ID - 3115264_INTL (Added the replacement information.)
    • Vulnerability ID - 3115434_INTL (Added the replacement information.)
    • Vulnerability ID - 3115493_INTL (Added the replacement information.)
    • Vulnerability ID - 3127959_INTL (Added the replacement information.)
    • Vulnerability ID - 3127978_INTL (Added the replacement information.)
    • Vulnerability ID - 3141470_INTL (Added the replacement information.)
    • Vulnerability ID - 3141499_INTL (Added the replacement information.)
    • Vulnerability ID - 3178650_INTL (Added the replacement information.)
    • Vulnerability ID - 3178713_INTL (Added the replacement information.)
    • Vulnerability ID - 3191878_INTL (Added the replacement information.)

    New Patch Downloads  

    • project2013-x-none-kb3191941-x86.cab  
    • project2013-x-none-kb3191941-x64.cab

     

    Where to Send Feedback        

    At Ivanti, we are constantly striving to improve our products and services and hope you find these changes reflective of our ongoing commitment to listen to you—our partners and customers—in providing the best possible solutions to meet your needs now and in the future.  Please continue to provide feedback by contacting our local support organization. 

     

    Best regards,

    Ivanti Product Support

     

    Copyright © 2017 Ivanti Software.  All rights reserved. Ivanti is either a registered trademark or trademark of Ivanti Software, Ltd. or its affiliated entities in the United States and/or other countries. Other names or brands may be claimed as the property of others. 

     

    Information in this document is provided for information purposes only.  The information presented here is subject to change without notice.  This information is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including any implied warranties and conditions of merchantability or fitness for a particular purpose. Ivanti disclaims any liability with respect to this document and Ivanti has no responsibility or liability for any third party products of any content contained on any site referenced herein.  This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. For the most current product information, please visit http://www.ivanti.com