ALT-BU-2022-5876-1
Branch p10_e2k update bulletin.
Package milkytracker updated to version 1.03.00-alt1_1 for branch p10_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-14464
XMFile::read in XMFile.cpp in milkyplay in MilkyTracker 1.02.00 has a heap-based buffer overflow.
- https://github.com/milkytracker/MilkyTracker/issues/184
- https://github.com/milkytracker/MilkyTracker/issues/184
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- FEDORA-2019-3d5f61419f
- FEDORA-2019-3d5f61419f
- FEDORA-2019-04babe66b5
- FEDORA-2019-04babe66b5
- USN-4499-1
- USN-4499-1
Modified: 2024-11-21
CVE-2019-14496
LoaderXM::load in LoaderXM.cpp in milkyplay in MilkyTracker 1.02.00 has a stack-based buffer overflow.
- https://github.com/milkytracker/MilkyTracker/issues/183
- https://github.com/milkytracker/MilkyTracker/issues/183
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- USN-4499-1
- USN-4499-1
Modified: 2024-11-21
CVE-2019-14497
ModuleEditor::convertInstrument in tracker/ModuleEditor.cpp in MilkyTracker 1.02.00 has a heap-based buffer overflow.
- https://github.com/milkytracker/MilkyTracker/issues/182
- https://github.com/milkytracker/MilkyTracker/issues/182
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- USN-4499-1
- USN-4499-1
Modified: 2024-11-21
CVE-2020-15569
PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
- https://github.com/milkytracker/MilkyTracker/commit/7afd55c42ad80d01a339197a2d8b5461d214edaf
- https://github.com/milkytracker/MilkyTracker/commit/7afd55c42ad80d01a339197a2d8b5461d214edaf
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-44540
A vulnerability was found in Privoxy which was fixed in get_url_spec_param() by freeing memory of compiled pattern spec before bailing.
Modified: 2024-11-21
CVE-2021-44541
A vulnerability was found in Privoxy which was fixed in process_encrypted_request_headers() by freeing header memory when failing to get the request destination.
Modified: 2024-11-21
CVE-2021-44542
A memory leak vulnerability was found in Privoxy when handling errors.
Modified: 2024-11-21
CVE-2021-44543
An XSS vulnerability was found in Privoxy which was fixed in cgi_error_no_template() by encode the template name when Privoxy is configured to servce the user-manual itself.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-33293
Panorama Tools libpano13 v2.9.20 was discovered to contain an out-of-bounds read in the function panoParserFindOLine() in parser.c.
- https://groups.google.com/u/1/g/hugin-ptx/c/gLtz2vweD74
- https://groups.google.com/u/1/g/hugin-ptx/c/gLtz2vweD74
- [debian-lts-announce] 20220320 [SECURITY] [DLA 2957-1] libpano13 security update
- [debian-lts-announce] 20220320 [SECURITY] [DLA 2957-1] libpano13 security update
- https://sourceforge.net/p/panotools/libpano13/ci/62aa7eed8fae5d8f247a2508a757f31000de386f/
- https://sourceforge.net/p/panotools/libpano13/ci/62aa7eed8fae5d8f247a2508a757f31000de386f/
Closed vulnerabilities
BDU:2022-05877
Уязвимость функции ldns_rr_new_frm_str_internal библиотеки DNS LDNS, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-05917
Уязвимость функции ldns_nsec3_salt_data библиотеки DNS LDNS, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-05943
Уязвимость компонента parse.c библиотеки DNS LDNS, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-1000231
A double-free vulnerability in parse.c in ldns 1.7.0 have unspecified impact and attack vectors.
- openSUSE-SU-2020:0438
- openSUSE-SU-2020:0438
- [debian-lts-announce] 20171121 [SECURITY] [DLA 1182-1] ldns security update
- [debian-lts-announce] 20171121 [SECURITY] [DLA 1182-1] ldns security update
- https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=1256
- https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=1256
Modified: 2024-11-21
CVE-2017-1000232
A double-free vulnerability in str2host.c in ldns 1.7.0 have unspecified impact and attack vectors.
Modified: 2024-11-21
CVE-2020-19860
When ldns version 1.7.1 verifies a zone file, the ldns_rr_new_frm_str_internal function has a heap out of bounds read vulnerability. An attacker can leak information on the heap by constructing a zone file payload.
Modified: 2024-11-21
CVE-2020-19861
When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.
Package liburiparser updated to version 0.9.6-alt1 for branch p10_e2k.
Closed vulnerabilities
BDU:2022-05751
Уязвимость парсера Uriparser, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05786
Уязвимость парсера Uriparser, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-46141
An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriFreeUriMembers and uriMakeOwner.
- https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/
- https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/
- https://github.com/uriparser/uriparser/issues/121
- https://github.com/uriparser/uriparser/issues/121
- https://github.com/uriparser/uriparser/pull/124
- https://github.com/uriparser/uriparser/pull/124
- [debian-lts-announce] 20220126 [SECURITY] [DLA 2883-2] uriparser security update
- [debian-lts-announce] 20220126 [SECURITY] [DLA 2883-2] uriparser security update
- FEDORA-2022-00a529a8bf
- FEDORA-2022-00a529a8bf
- FEDORA-2022-cfd0048127
- FEDORA-2022-cfd0048127
- DSA-5063
- DSA-5063
Modified: 2024-11-21
CVE-2021-46142
An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriNormalizeSyntax.
- https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/
- https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/
- https://github.com/uriparser/uriparser/issues/122
- https://github.com/uriparser/uriparser/issues/122
- https://github.com/uriparser/uriparser/pull/124
- https://github.com/uriparser/uriparser/pull/124
- FEDORA-2022-00a529a8bf
- FEDORA-2022-00a529a8bf
- FEDORA-2022-cfd0048127
- FEDORA-2022-cfd0048127
- DSA-5063
- DSA-5063
Closed vulnerabilities
BDU:2022-01636
Уязвимость виртуальной обучающей среды Moodle, связанная с непринятием мер по защите структуры запроса SQL , позволяющая нарушителю выполнять произвольные SQL-запросы в базе данных
BDU:2022-01638
Уязвимость виртуальной обучающей среды Moodle, связанная с недостатками контроля доступа, позволяющая нарушителю настроить значки курса с помощью критериев поля профиля
Modified: 2024-11-21
CVE-2022-0332
A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
Modified: 2024-11-21
CVE-2022-0333
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The calendar:manageentries capability allowed managers to access or modify any calendar event, but should have been restricted from accessing user level events.
Modified: 2024-11-21
CVE-2022-0334
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability.
Modified: 2024-11-21
CVE-2022-0335
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk.
Modified: 2024-11-21
CVE-2022-0983
An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default.
Modified: 2024-11-21
CVE-2022-0984
Users with the capability to configure badge criteria (teachers and managers by default) were able to configure course badges with profile field criteria, which should only be available for site badges.
Modified: 2024-11-21
CVE-2022-0985
Insufficient capability checks could allow users with the moodle/site:uploadusers capability to delete users, without having the necessary moodle/user:delete capability.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-27811
GNOME OCRFeeder before 0.8.4 allows OS command injection via shell metacharacters in a PDF or image filename.
- https://gitlab.gnome.org/GNOME/ocrfeeder/-/commit/5286120c8bc8b7ba74e0f9b19b5262b509f38cee
- https://gitlab.gnome.org/GNOME/ocrfeeder/-/commit/5286120c8bc8b7ba74e0f9b19b5262b509f38cee
- https://gitlab.gnome.org/GNOME/ocrfeeder/-/issues/20
- https://gitlab.gnome.org/GNOME/ocrfeeder/-/issues/20
- https://gitlab.gnome.org/GNOME/ocrfeeder/-/merge_requests/13
- https://gitlab.gnome.org/GNOME/ocrfeeder/-/merge_requests/13
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-31879
GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.
Package strongswan updated to version 5.9.6-alt1 for branch p10_e2k.
Closed vulnerabilities
BDU:2023-02802
Уязвимость демона strongSwan, вызванная целочисленным переполнением (при условии, что кэш сертификатов в памяти полон), позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-41990
The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.
- https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf
- https://github.com/strongswan/strongswan/releases/tag/5.9.4
- https://github.com/strongswan/strongswan/releases/tag/5.9.4
- FEDORA-2021-0b37146973
- FEDORA-2021-0b37146973
- FEDORA-2021-b3df83339e
- FEDORA-2021-b3df83339e
- FEDORA-2021-95fab6a482
- FEDORA-2021-95fab6a482
- DSA-4989
- DSA-4989
- https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41990%29.html
- https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41990%29.html
Modified: 2024-11-21
CVE-2021-41991
The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.
- https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-539476.pdf
- https://github.com/strongswan/strongswan/releases/tag/5.9.4
- https://github.com/strongswan/strongswan/releases/tag/5.9.4
- [debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update
- [debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update
- FEDORA-2021-0b37146973
- FEDORA-2021-0b37146973
- FEDORA-2021-b3df83339e
- FEDORA-2021-b3df83339e
- FEDORA-2021-95fab6a482
- FEDORA-2021-95fab6a482
- DSA-4989
- DSA-4989
- https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html
- https://www.strongswan.org/blog/2021/10/18/strongswan-vulnerability-%28cve-2021-41991%29.html
Modified: 2024-11-21
CVE-2021-45079
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
Closed vulnerabilities
BDU:2022-02042
Уязвимость функции decode_chars рендерера субтитров формата ASS/SSA Libass, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-36430
libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libass/OSV-2020-2099.yaml
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libass/OSV-2020-2099.yaml
- https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632
- https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632
- FEDORA-2022-2af150223a
- FEDORA-2022-2af150223a
- GLSA-202208-13
- GLSA-202208-13
Package perl-Image-ExifTool updated to version 12.42-alt1 for branch p10_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-23935
lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\|$/ check, leading to command injection.
- https://gist.github.com/ert-plus/1414276e4cb5d56dd431c2f0429e4429
- https://gist.github.com/ert-plus/1414276e4cb5d56dd431c2f0429e4429
- https://github.com/exiftool/exiftool/commit/74dbab1d2766d6422bb05b033ac6634bf8d1f582
- https://github.com/exiftool/exiftool/commit/74dbab1d2766d6422bb05b033ac6634bf8d1f582
Closed vulnerabilities
BDU:2022-01068
Уязвимость командной оболочки zsh, связанная с непринятием мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2021-45444
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- [debian-lts-announce] 20220218 [SECURITY] [DLA 2926-1] zsh security update
- [debian-lts-announce] 20220218 [SECURITY] [DLA 2926-1] zsh security update
- FEDORA-2022-adf0c6d196
- FEDORA-2022-adf0c6d196
- FEDORA-2022-0a06987c3c
- FEDORA-2022-0a06987c3c
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- https://vuln.ryotak.me/advisories/63
- https://vuln.ryotak.me/advisories/63
- DSA-5078
- DSA-5078
- https://zsh.sourceforge.io/releases.html
- https://zsh.sourceforge.io/releases.html
Package rpm-build-python3 updated to version 0.1.19-alt1 for branch p10_e2k.
Closed bugs
%python3_build does not work for PEP 517 conforming upstreams
Closed vulnerabilities
BDU:2022-04363
Уязвимость TCP-модулей программной утилиты для обработки логов Rsyslog, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-24903
Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. It is best practice not to directly expose them to the public. When this practice is followed, the risk is considerably lower. Module `imdiag` is a diagnostics module primarily intended for testbench runs. We do not expect it to be present on any production installation. Octet-counted framing is not very common. Usually, it needs to be specifically enabled at senders. If users do not need it, they can turn it off for the most important modules. This will mitigate the vulnerability.
- https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705
- https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705
- https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8
- https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8
- [debian-lts-announce] 20220520 [SECURITY] [DLA 3016-1] rsyslog security update
- [debian-lts-announce] 20220520 [SECURITY] [DLA 3016-1] rsyslog security update
- FEDORA-2022-f796a28a7b
- FEDORA-2022-f796a28a7b
- https://security.netapp.com/advisory/ntap-20221111-0002/
- https://security.netapp.com/advisory/ntap-20221111-0002/
- DSA-5150
- DSA-5150
Closed vulnerabilities
BDU:2022-05325
Уязвимость компонента inflate.c библиотеки zlib, позволяющая нарушителю выполнить произвольный код
Modified: 2025-05-30
CVE-2022-37434
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
- 20221030 APPLE-SA-2022-10-27-1 iOS 15.7.1 and iPadOS 15.7.1
- 20221030 APPLE-SA-2022-10-27-2 Additional information for APPLE-SA-2022-10-24-1 iOS 16.1 and iPadOS 16
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- [oss-security] 20220805 zlib buffer overflow
- [oss-security] 20220808 Re: zlib buffer overflow
- https://github.com/curl/curl/issues/9271
- https://github.com/ivd38/zlib_overflow
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/madler/zlib/commit/1eb7682f845ac9e9bf9ae35bbfb3bad5dacbd91d
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update
- FEDORA-2022-b8232d1cca
- FEDORA-2022-15da0cf165
- FEDORA-2022-0b517a5397
- FEDORA-2022-3c28ae0cd8
- FEDORA-2022-25e4dbedf9
- https://security.netapp.com/advisory/ntap-20220901-0005/
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213494
- DSA-5218
- https://github.com/curl/curl/issues/9271
- DSA-5218
- https://support.apple.com/kb/HT213494
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213488
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://security.netapp.com/advisory/ntap-20220901-0005/
- FEDORA-2022-25e4dbedf9
- FEDORA-2022-3c28ae0cd8
- FEDORA-2022-0b517a5397
- FEDORA-2022-15da0cf165
- FEDORA-2022-b8232d1cca
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/ivd38/zlib_overflow
- https://github.com/curl/curl/issues/9271
- [oss-security] 20220808 Re: zlib buffer overflow
- [oss-security] 20220805 zlib buffer overflow
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-2 Additional information for APPLE-SA-2022-10-24-1 iOS 16.1 and iPadOS 16
- 20221030 APPLE-SA-2022-10-27-1 iOS 15.7.1 and iPadOS 15.7.1
Closed bugs
teamd@.service безполезен
Не работает NetworkManager + teamd
teamd 100% CPU usage
Package token-manager updated to version 0.12-alt10 for branch p10_e2k.
Closed bugs
token-manager не запускается
Не выводит сообщение о том, что не установлено КриптоПРО