From 776c8b92bbe6004f2454d02eab01530e8c6a395c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?K=C3=A5re=20Thor=20Olsen?= Date: Tue, 16 Aug 2022 10:40:42 +0200 Subject: Initial translations --- danish/security/2022/dsa-5202.wml | 20 ++++++++++++++ danish/security/2022/dsa-5203.wml | 22 +++++++++++++++ danish/security/2022/dsa-5204.wml | 20 ++++++++++++++ danish/security/2022/dsa-5205.wml | 56 +++++++++++++++++++++++++++++++++++++++ danish/security/2022/dsa-5206.wml | 20 ++++++++++++++ 5 files changed, 138 insertions(+) create mode 100644 danish/security/2022/dsa-5202.wml create mode 100644 danish/security/2022/dsa-5203.wml create mode 100644 danish/security/2022/dsa-5204.wml create mode 100644 danish/security/2022/dsa-5205.wml create mode 100644 danish/security/2022/dsa-5206.wml (limited to 'danish/security') diff --git a/danish/security/2022/dsa-5202.wml b/danish/security/2022/dsa-5202.wml new file mode 100644 index 00000000000..9e3abb6b38b --- /dev/null +++ b/danish/security/2022/dsa-5202.wml @@ -0,0 +1,20 @@ +#use wml::debian::translation-check translation="3a206fecfc1df5d752e4250343dc6bb6952ff4b0" mindelta="1" +sikkerhedsopdatering + +

Sandipan Roy opdagede to sårbarheder i InfoZIP's unzipprogram, et +udpakningsprogram til .zip-filer, hvilke kunne medføre lammelsesangreb eller +potentielt udførelse af vilkårlig kode.

+ +

I den stabile distribution (bullseye), er disse problemer rettet i +version 6.0-26+deb11u1.

+ +

Vi anbefaler at du opgraderer dine unzip-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende unzip, se +dens sikkerhedssporingsside på: +\ +https://security-tracker.debian.org/tracker/unzip

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2022/dsa-5202.data" diff --git a/danish/security/2022/dsa-5203.wml b/danish/security/2022/dsa-5203.wml new file mode 100644 index 00000000000..1dcdbfe2b89 --- /dev/null +++ b/danish/security/2022/dsa-5203.wml @@ -0,0 +1,22 @@ +#use wml::debian::translation-check translation="8db46aa0e33c250219b342a4397709dcb0b86258" mindelta="1" +sikkerhedsopdatering + +

Jaak Ristioja opdagede en dobbelt frigivelse-sårbarhed i GnuTLS, et bibliotek +til implementering af protokollerne TLS og SSL, under verifikation af +pkcs7-signaturer. En fjernangriber kunne drage nytte af fejlen til at få en +applikation, der anvender GnuTLS-biblioteket, til at gå ned (lammelsesangreb) +eller potentielt udførelse af vilkårlig kode.

+ +

I den stabile distribution (bullseye), er dette problem rettet i +version 3.7.1-5+deb11u2.

+ +

Vi anbefaler at du opgraderer dine gnutls28-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende gnutls28, se +dens sikkerhedssporingsside på: +\ +https://security-tracker.debian.org/tracker/gnutls28

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2022/dsa-5203.data" diff --git a/danish/security/2022/dsa-5204.wml b/danish/security/2022/dsa-5204.wml new file mode 100644 index 00000000000..91dd2ba5572 --- /dev/null +++ b/danish/security/2022/dsa-5204.wml @@ -0,0 +1,20 @@ +#use wml::debian::translation-check translation="ed7c8c59ad31e240b99bdcd1c1e7172d1d355ce6" mindelta="1" +sikkerhedsopdatering + +

Adam Doupe opdagede adskillige sårbarheder i Gstreamer-plugins til demux af +Mastroska- og AVI-filer, hvilket kunne medføre lammelsesangreb eller udførelse +af vilkårlig kode.

+ +

I den stabile distribution (bullseye), er disse problemer rettet i +version 1.18.4-2+deb11u1.

+ +

Vi anbefaler at du opgraderer dine gst-plugins-good1.0-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende gst-plugins-good1.0, se +dens sikkerhedssporingsside på: +\ +https://security-tracker.debian.org/tracker/gst-plugins-good1.0

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2022/dsa-5204.data" diff --git a/danish/security/2022/dsa-5205.wml b/danish/security/2022/dsa-5205.wml new file mode 100644 index 00000000000..820deb84638 --- /dev/null +++ b/danish/security/2022/dsa-5205.wml @@ -0,0 +1,56 @@ +#use wml::debian::translation-check translation="cbe9cd7fab7b8b8992562b1757c8d4d429b5c67c" mindelta="1" +sikkerhedsopdatering + +

Flere sårbarheder er opdaget i Samba, en SMB/CIFS-fil-, -print- og +loginserver til Unix.

+ + + +

I den stabile distribution (bullseye), er disse problemer rettet i +version 2:4.13.13+dfsg-1~deb11u5. Rettelsen af +\ +CVE-2022-32745, krævede en opdatering af ldb 2:2.2.3-2~deb11u2, for at rette +fejlen.

+ +

Vi anbefaler at du opgraderer dine samba-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende samba, se +dens sikkerhedssporingssidede på: +\ +https://security-tracker.debian.org/tracker/samba

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2022/dsa-5205.data" diff --git a/danish/security/2022/dsa-5206.wml b/danish/security/2022/dsa-5206.wml new file mode 100644 index 00000000000..e6a1cfdc489 --- /dev/null +++ b/danish/security/2022/dsa-5206.wml @@ -0,0 +1,20 @@ +#use wml::debian::translation-check translation="bab458d574b4b45bba48034bc16dd70f3fa14303" mindelta="1" +sikkerhedsopdatering + +

Flere sårbarheder blev opdaget i Apache Traffic Server, en reverse- og +forwardproxyserver, hvilke kunne medføre smugling af HTTP-forespørgsler, +cacheforgiftning eller informationsafsløring.

+ +

I den stabile distribution (bullseye), er disse problemer rettet i +version 8.1.5+ds-1~deb11u1.

+ +

Vi anbefaler at du opgraderer dine trafficserver-pakker.

+ +

For detaljeret sikkerhedsstatus vedrørende trafficserver, se +dens sikkerhedssporingsside på: +\ +https://security-tracker.debian.org/tracker/trafficserver

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2022/dsa-5206.data" -- cgit v1.2.3