

Android Studio 4.2 available in the Stable channelĪndroid Studio 4.2.1 is now available in the Stable channel.Android Studio Arctic Fox Beta 1 available.Android Studio Bumblebee Canary 1 available.This step replaces the removed files and correct the vulnerability:Ħ Restart the PowerChute service. Go to /opt/APC/PowerChute/group1/lib and delete:ĥ Copy the contents of the Linux-Replacement-files folder to /opt/APC/PowerChute/group1/lib. the command is systemctl stop PowerChuteĤ. Uncompress the folder Linux-Replacement-files.zipģ. Go to C:\Program Files\APC\PowerChute\group1\lib and delete:ĥ Copy the contents of the Win-Replacement-files folder to C:\Program Files\APC\PowerChute\group1\lib. Open a command prompt as an administrator and stop the PowerChute service.

Download the folder Win-Replacement-files.zip or Linux-Replacement-files.zip that are attached and send the zip and instructions below to the customer.ģ.

The information below can be shared with customers when they report either CVE as needed.ġ. ****This FAQ is internal because the CVEs have not been posted to the Cyber Security Portal. If a customer fells they must upgrade because of CVE-2022-42889 have the customer follow the instruction below. Our testing shows this not vulnerable to the string interpolation issue highlighted by CVE-2022-42889. PCNS use this to make some user-provided input (outlet group names, ssh action titles, etc.) safe for display in HTML. NOTE: PCNS only uses StringEscapeUtils.escapeHtml4(String) from the commons-text library.
