Microsoft yanks Office for Mac 2011 upgrade
Halts auto delivery until it figures out why SP2 corrupts Outlook's identity database
Computerworld - Microsoft last Friday pulled an Office for Mac 2011 major update from its upgrade servers, acknowledging bugs that have corrupted the Outlook database on some machines.
Office for Mac 2011 Service Pack 2 (SP2) was released April 12. That same day, users who had upgraded began reporting problems on Microsoft's support site, saying that they were unable to run Outlook, the suite's email client.
Last Tuesday, Microsoft confirmed that the SP2 upgrade could in some cases corrupt the Outlook identity database, and offered workarounds to prevent that from happening for those who had not yet installed the service pack, as well as a step-by-step guide to reconstructing the database for those affected by the bug.
Three days later, Microsoft took more drastic action, shutting down the delivery of Office for Mac 2011 SP2 through the company's automatic upgrade service.
"Our goal is provide the simplest update experience for everyone -- so we have temporarily stopped pushing out the SP2 update through Microsoft AutoUpdate while we investigate the issue," Microsoft announced in a Friday post to its Office for Mac blog.
The company did not say when it would restore SP2 to the automatic upgrade channel, but did tell users they were free to manually download the service pack from its website.
Microsoft has yanked updates from its servers before. The most serious examples in recent years were in February 2010 when it stopped serving a security update to Windows XP PCs that were crashing with the notorious "Blue Screen of Death," and two years earlier, when Microsoft shut down an update for Windows Vista that crippled systems with endless reboots.
Office for Mac 2011 debuted in October 2010, and is available in two editions for the general public, as well as others for academic and enterprise customers.
Microsoft shipped the first service pack for Office for Mac 2011 just over a year ago.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts