From da9c2f57f736b4e753ea46364d0dfba89fc9041e Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?K=C3=A5re=20Thor=20Olsen?= Date: Tue, 12 Oct 2021 09:50:46 +0200 Subject: Initial translations --- danish/security/2021/dsa-4981.wml | 22 ++++++++++++++++++++++ danish/security/2021/dsa-4982.wml | 24 ++++++++++++++++++++++++ danish/security/2021/dsa-4983.wml | 28 ++++++++++++++++++++++++++++ 3 files changed, 74 insertions(+) create mode 100644 danish/security/2021/dsa-4981.wml create mode 100644 danish/security/2021/dsa-4982.wml create mode 100644 danish/security/2021/dsa-4983.wml diff --git a/danish/security/2021/dsa-4981.wml b/danish/security/2021/dsa-4981.wml new file mode 100644 index 00000000000..67f93e4b6bc --- /dev/null +++ b/danish/security/2021/dsa-4981.wml @@ -0,0 +1,22 @@ +#use wml::debian::translation-check translation="67497a8fa36e45e02dc4c83683e31e3e9c185249" mindelta="1" +sikkerhedsopdatering + +

Adskillige sikkerhedsproblemer er fundet i webbrowseren Mozilla Firefox, +hvilke potentielt kunne medføre udførelse af vilkårlig kode.

+ +

I den gamle stabile distribution (buster), er disse problemer rettet i +version 78.15.0esr-1~deb10u1.

+ +

I den stabile distribution (bullseye), er disse problemer rettet i +version 78.15.0esr-1~deb11u1.

+ +

Vi anbefaler at du opgraderer dine firefox-esr-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende firefox-esr, se +dens sikkerhedssporingsside på: +\ +https://security-tracker.debian.org/tracker/firefox-esr

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2021/dsa-4981.data" diff --git a/danish/security/2021/dsa-4982.wml b/danish/security/2021/dsa-4982.wml new file mode 100644 index 00000000000..fc29806658f --- /dev/null +++ b/danish/security/2021/dsa-4982.wml @@ -0,0 +1,24 @@ +#use wml::debian::translation-check translation="5ccf6f35aca5c2fe23efdaee39652b59f684e253" mindelta="1" +sikkerhedsopdatering + +

Flere sårbarheder er fundet i Apaches HTTP-server, hvilke kunne medføre +lammelsesangreb. Desuden blev der opdaget en sårbarhed i mod_proxy, som gjorde +det muligt for en angriber kunne udnytte til at narre serveren til at +videresende forespørgsler til vilkårlige ophavsserere.

+ +

I den gamle stabile distribution (buster), er disse problemer rettet i +version 2.4.38-3+deb10u6.

+ +

I den stabile distribution (bullseye), er disse problemer rettet i +version 2.4.51-1~deb11u1.

+ +

Vi anbefaler at du opgraderer dine apache2-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende apache2, se +dens sikkerhedssporingsside på: +\ +https://security-tracker.debian.org/tracker/apache2

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2021/dsa-4982.data" diff --git a/danish/security/2021/dsa-4983.wml b/danish/security/2021/dsa-4983.wml new file mode 100644 index 00000000000..0f9b9d9ad17 --- /dev/null +++ b/danish/security/2021/dsa-4983.wml @@ -0,0 +1,28 @@ +#use wml::debian::translation-check translation="546016c2142ac66b3cadc5d6f9f7358a846ad458" mindelta="1" +sikkerhedsopdatering + +

Pavel Toporkov opdagede en sårbarhed i Neutron, OpenStacks virtuelle +netværksservice, hvilken gjorde det muligt at genopsætte dnsmasq gennem en +fabrikerede dhcp_extra_opts-parametre.

+ +

I den gamle stabile distribution (buster), er dette problem rettet i +version 2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1. Denne opdatering +retter også +\ +CVE-2021-20267.

+ +

I den stabile distribution (bullseye), er dette problem rettet i +version 2:17.2.1-0+deb11u1. Denne opdatering retter også +\ +CVE-2021-38598.

+ +

Vi anbefaler at du opgraderer dine neutron-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende neutron, se +dens sikkerhedssporingsside på: +\ +https://security-tracker.debian.org/tracker/neutron

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2021/dsa-4983.data" -- cgit v1.2.3