aboutsummaryrefslogtreecommitdiffstats
path: root/danish/security
diff options
context:
space:
mode:
authorKåre Thor Olsen <kaare@nightcall.dk>2022-07-07 08:39:04 +0200
committerKåre Thor Olsen <kaare@nightcall.dk>2022-07-07 08:39:04 +0200
commit56e853ff93e14193b6239c28c73e38d18e4a0b21 (patch)
tree82da89c333f30a95e2740da1d0aa5e046f795318 /danish/security
parent006fd719ddd7701428df2e4ab411c878c33ce4ba (diff)
Initial translation
Diffstat (limited to 'danish/security')
-rw-r--r--danish/security/2022/dsa-5178.wml46
1 files changed, 46 insertions, 0 deletions
diff --git a/danish/security/2022/dsa-5178.wml b/danish/security/2022/dsa-5178.wml
new file mode 100644
index 00000000000..bae83d97547
--- /dev/null
+++ b/danish/security/2022/dsa-5178.wml
@@ -0,0 +1,46 @@
+#use wml::debian::translation-check translation="006fd719ddd7701428df2e4ab411c878c33ce4ba" mindelta="1"
+<define-tag description>sikkerhedsopdatering</define-tag>
+<define-tag moreinfo>
+<p>Denne opdatering indeholder opdateret CPU-mikrokode til nogle af Intel
+CPU-typer, med afhjælpelse af sikkerhedssårbarheder.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21123">CVE-2022-21123</a>,
+ <a href="https://security-tracker.debian.org/tracker/CVE-2022-21125">CVE-2022-21125</a>,
+ <a href="https://security-tracker.debian.org/tracker/CVE-2022-21127">CVE-2022-21127</a>,
+ <a href="https://security-tracker.debian.org/tracker/CVE-2022-21166">CVE-2022-21166</a>
+
+ <p>Forskellige efterforskere opdagede fejl i Intel-processorer, der under ét
+ refereres til som MMIO Stale Data-sårbarheder, hvilke kunne medføre
+ informationslækager til lokale brugere.</p>
+
+ <p>For flere oplysninger, se:
+ <a href="https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html">\
+ https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html</a></p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-21151">CVE-2022-21151</a>
+
+ <p>Alysa Milburn, Jason Brandt, Avishai Redelman og Nir Lavi opdagede at
+ ved nogle Intel-processorer, kunne optimeringsfjernelse eller -ændring
+ af sikkerhedskritisk kode, medføre informationsafsløring to lokale
+ brugere.</p></li>
+
+</ul>
+
+<p>I den gamle stabile distribution (buster), er disse problemer rettet
+i version 3.20220510.1~deb10u1.</p>
+
+<p>I den stabile distribution (bullseye), er disse problemer rettet i
+version 3.20220510.1~deb11u1.</p>
+
+<p>Vi anbefaler at du opgraderer dine intel-microcode-pakker.</p>
+
+<p>For detaljeret sikkerhedsstatus vedrørende intel-microcode, se
+dens sikkerhedssporingsside på:
+<a href="https://security-tracker.debian.org/tracker/intel-microcode">\
+https://security-tracker.debian.org/tracker/intel-microcode</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/security/2022/dsa-5178.data"

© 2014-2024 Faster IT GmbH | imprint | privacy policy