From 171d5af7f8a0345fbfc1defe22cf3c76b4dbb220 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?K=C3=A5re=20Thor=20Olsen?= Date: Wed, 31 Aug 2022 13:26:01 +0200 Subject: Initial translations --- danish/security/2022/dsa-5218.wml | 21 +++++++++++++++++++++ danish/security/2022/dsa-5219.wml | 28 ++++++++++++++++++++++++++++ danish/security/2022/dsa-5220.wml | 28 ++++++++++++++++++++++++++++ danish/security/2022/dsa-5221.wml | 19 +++++++++++++++++++ danish/security/2022/dsa-5222.wml | 20 ++++++++++++++++++++ 5 files changed, 116 insertions(+) create mode 100644 danish/security/2022/dsa-5218.wml create mode 100644 danish/security/2022/dsa-5219.wml create mode 100644 danish/security/2022/dsa-5220.wml create mode 100644 danish/security/2022/dsa-5221.wml create mode 100644 danish/security/2022/dsa-5222.wml (limited to 'danish/security') diff --git a/danish/security/2022/dsa-5218.wml b/danish/security/2022/dsa-5218.wml new file mode 100644 index 00000000000..c988707ed8f --- /dev/null +++ b/danish/security/2022/dsa-5218.wml @@ -0,0 +1,21 @@ +#use wml::debian::translation-check translation="01ddff9e4465c15cc10ede6adadf71d61eead0ec" mindelta="1" +sikkerhedsopdatering + +

Evgeny Legerov rapporterede om en heapbaseret bufferoverløbssårbarhed i +inflate-handlingen i zlib, hvilken kunne medføre lammelsesangreb eller +potentielt udførelse af vilkårlig kode, hvis særligt fremstillet inddata blev +behandlet.

+ +

I den stabile distribution (bullseye), er dette problem rettet i +version 1:1.2.11.dfsg-2+deb11u2.

+ +

Vi anbefaler at du opgraderer dine zlib-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende zlib, se +dens sikkerhedssporingssidede på: +\ +https://security-tracker.debian.org/tracker/zlib

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2022/dsa-5218.data" diff --git a/danish/security/2022/dsa-5219.wml b/danish/security/2022/dsa-5219.wml new file mode 100644 index 00000000000..da9b2ab23bb --- /dev/null +++ b/danish/security/2022/dsa-5219.wml @@ -0,0 +1,28 @@ +#use wml::debian::translation-check translation="23faf311c5609ca5f3e8f7b83ff607771d48ad37" mindelta="1" +sikkerhedsopdatering + +

Følgende sårbarheder er opdaget i webmotoren WebKitGTK:

+ + + +

I den stabile distribution (bullseye), er dette problem rettet i +version 2.36.7-1~deb11u1.

+ +

Vi anbefaler at du opgraderer dine webkit2gtk-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende webkit2gtk, se +dens sikkerhedssporingsside på: +\ +https://security-tracker.debian.org/tracker/webkit2gtk

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2022/dsa-5219.data" diff --git a/danish/security/2022/dsa-5220.wml b/danish/security/2022/dsa-5220.wml new file mode 100644 index 00000000000..81078c5c44c --- /dev/null +++ b/danish/security/2022/dsa-5220.wml @@ -0,0 +1,28 @@ +#use wml::debian::translation-check translation="5eff97398b434a9348247cd1395f14ab9c002a66" mindelta="1" +sikkerhedsopdatering + +

Følgende sårbarheder er opdaget i webmotoren WPE WebKit:

+ + + +

I den stabile distribution (bullseye), er dette problem rettet i +version 2.36.7-1~deb11u1.

+ +

Vi anbefaler at du opgraderer dine wpewebkit-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende wpewebkit, se +dens sikkerhedssporingsside på: +\ +https://security-tracker.debian.org/tracker/wpewebkit

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2022/dsa-5220.data" diff --git a/danish/security/2022/dsa-5221.wml b/danish/security/2022/dsa-5221.wml new file mode 100644 index 00000000000..3e1aad12489 --- /dev/null +++ b/danish/security/2022/dsa-5221.wml @@ -0,0 +1,19 @@ +#use wml::debian::translation-check translation="896737888bb26bdfa1365098c567402ce995de8a" mindelta="1" +sikkerhedsopdatering + +

Adskillige sikkerhedsproblemer blev opdaget i Thunderbird, hvilke kunne +medføre lammelsesangreb eller udførelse af vilkårlig kode.

+ +

I den stabile distribution (bullseye), er disse problemer rettet i +version 1:91.13.0-1~deb11u1.

+ +

Vi anbefaler at du opgraderer dine thunderbird-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende thunderbird, se +dens sikkerhedssporingsside på: +\ +https://security-tracker.debian.org/tracker/thunderbird

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2022/dsa-5221.data" diff --git a/danish/security/2022/dsa-5222.wml b/danish/security/2022/dsa-5222.wml new file mode 100644 index 00000000000..6f00917e066 --- /dev/null +++ b/danish/security/2022/dsa-5222.wml @@ -0,0 +1,20 @@ +#use wml::debian::translation-check translation="d4ab36a87f08d9ff56a4f4fa15790d60d2e5237e" mindelta="1" +sikkerhedsopdatering + +

Et bufferoverløb blev opdaget i vhost-koden i DPDK, et sæt biblioteker til +hurtig pakkebehandling, hvilken kunne medføre lammelsesangreb eller udførelse af +vilkårlig kode af ondsindede gæster/containere.

+ +

I den stabile distribution (bullseye), er disse problemer rettet i +version 20.11.6-1~deb11u1.

+ +

Vi anbefaler at du opgraderer dine dpdk-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende dpdk, se +dens sikkerhedssporingsside på: +\ +https://security-tracker.debian.org/tracker/dpdk

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2022/dsa-5222.data" -- cgit v1.2.3