aboutsummaryrefslogtreecommitdiffstats
path: root/danish/security/2021/dsa-4983.wml
blob: 0f9b9d9ad1772146de68e145737a925217cd494b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
#use wml::debian::translation-check translation="546016c2142ac66b3cadc5d6f9f7358a846ad458" mindelta="1"
<define-tag description>sikkerhedsopdatering</define-tag>
<define-tag moreinfo>
<p>Pavel Toporkov opdagede en sårbarhed i Neutron, OpenStacks virtuelle 
netværksservice, hvilken gjorde det muligt at genopsætte dnsmasq gennem en 
fabrikerede dhcp_extra_opts-parametre.</p>

<p>I den gamle stabile distribution (buster), er dette problem rettet i 
version 2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1.  Denne opdatering 
retter også 
<a href="https://security-tracker.debian.org/tracker/CVE-2021-20267">\
CVE-2021-20267</a>.</p>

<p>I den stabile distribution (bullseye), er dette problem rettet i
version 2:17.2.1-0+deb11u1.  Denne opdatering retter også 
<a href="https://security-tracker.debian.org/tracker/CVE-2021-38598">\
CVE-2021-38598</a>.</p>

<p>Vi anbefaler at du opgraderer dine neutron-pakker.</p>

<p>For detaljeret sikkerhedsstatus vedrørende neutron, se
dens sikkerhedssporingsside på:
<a href="https://security-tracker.debian.org/tracker/neutron">\
https://security-tracker.debian.org/tracker/neutron</a></p>
</define-tag>

# do not modify the following line
#include "$(ENGLISHDIR)/security/2021/dsa-4983.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy