diff options
author | Kåre Thor Olsen <kaare@nightcall.dk> | 2020-01-06 08:15:35 +0100 |
---|---|---|
committer | Kåre Thor Olsen <kaare@nightcall.dk> | 2020-01-06 08:15:35 +0100 |
commit | a1bff3e0542ec2f51ec55a0aec7021797b7ab9a6 (patch) | |
tree | b0fe6a91b309aa2c191f3cb1d96ad912d318daac /danish | |
parent | 372b9918b8dd5c9193c869eaad221a873e13da39 (diff) |
Initial translation
Diffstat (limited to 'danish')
-rw-r--r-- | danish/security/2020/dsa-4597.wml | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/danish/security/2020/dsa-4597.wml b/danish/security/2020/dsa-4597.wml new file mode 100644 index 00000000000..c4059977939 --- /dev/null +++ b/danish/security/2020/dsa-4597.wml @@ -0,0 +1,23 @@ +#use wml::debian::translation-check translation="8a8180313689caf093ac3fe147b1018a2c6545dd" mindelta="1" +<define-tag description>sikkerhedsopdatering</define-tag> +<define-tag moreinfo> +<p>Der blev rapporteret, at Netty, et Java NIO-klient/server-framework, var en +HTTP-forspørgselssmuglingssårbarhed på grund af fejlhåndteret whitespace før et +kolon i HTTP-headere.</p> + +<p>I den gamle stabile distribution (stretch), er dette problem rettet +i version 1:4.1.7-2+deb9u1.</p> + +<p>I den stabile distribution (buster), er dette problem rettet i +version 1:4.1.33-1+deb10u1.</p> + +<p>Vi anbefaler at du opgraderer dine netty-pakker.</p> + +<p>For detaljeret sikkerhedsstatus vedrørende netty, se +dens sikkerhedssporingssidede på: +<a href="https://security-tracker.debian.org/tracker/netty">\ +https://security-tracker.debian.org/tracker/netty</a></p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/security/2020/dsa-4597.data" |