[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[INTL:da] Danish translation of the debconf templates linux-patch-grsecurity2



Package: linux-patch-grsecurity2
Severity: wishlist
Tags: l10n patch

Please include the attached Danish linux-patch-grsecurity2 translations.

joe@joe-desktop:~/over/debian/linux-patch-grsecurity2$ msgfmt --statistics -c -v -o /dev/null da.po
da.po: 4 oversatte tekster.

bye
Joe
# Danish translation linux-patch-grsecurity2.
# Copyright (C) linux-patch-grsecurity2 & nedenstående oversættere.
# This file is distributed under the same license as the linux-patch-grsecurity2 package.
# Joe Hansen (joedalton2@yahoo.dk), 2011.
#
msgid ""
msgstr ""
"Project-Id-Version: linux-patch-grsecurity2\n"
"Report-Msgid-Bugs-To: gcs@debian.hu\n"
"POT-Creation-Date: 2008-01-21 11:26-0500\n"
"PO-Revision-Date: 2011-05-28 18:30+01:00\n"
"Last-Translator: Joe Hansen <joedalton2@yahoo.dk>\n"
"Language-Team: Danish <debian-l10n-danish@lists.debian.org>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"

#. Type: text
#. Description
#: ../linux-patch-grsecurity2.templates:1001
msgid "The 2.1.2 release is a security bugfix release, please upgrade!"
msgstr "2.1.2-udgivelsen er en sikkerhedsrettelse; så opgrader venligst!"

#. Type: text
#. Description
#: ../linux-patch-grsecurity2.templates:1001
msgid ""
"In the included PaX patch a security bug was found. It affects kernels with "
"SEGMEXEC or RANDEXEC enabled (the predefined LOW and MEDIUM options do not "
"contain these). All users are encouraged to upgrade soon as the bug is "
"locally (and maybe remotely) exploitable; if you can not upgrade, then echo "
"\"0 0\" > /proc/sys/vm/pagetable_cache would reduce the risk, but patching "
"is still unavoidable. References: http://lists.netsys.com/pipermail/full-";
"disclosure/2005-March/032240.html http://www.grsecurity.net/news.php#grsec212";
msgstr ""
"I den inkluderede PaX-rettelse blev der fundet en sikkerhedsfejl. Den "
"påvirker kerner med SEGMEXEC og RANDEXEC aktiveret (de prædefinerede "
"indstillinger LOW og MEDIUM indeholder ikke disse). Alle brugere opfordres "
"til at opgradere, så snart fejlen kan udnyttes lokalt (og måske eksternt); "
"hvis du ikke kan opgradere, så vil echo »0 0« > /proc/sys/vm/pagetable_cache "
"reducere risikoen, men rettelsen (patching) kan stadig ikke undgås. "
"Referencer: http://lists.netsys.com/pipermail/full-disclosure/2005-March/";
"032240.html http://www.grsecurity.net/news.php#grsec212";

#. Type: text
#. Description
#: ../linux-patch-grsecurity2.templates:2001
msgid "The 2.1.3 release is also a security bugfix release, please upgrade!"
msgstr "2.1.3-udgivelsen er også en sikkerhedsrettelse; så opgrader venligst!"

#. Type: text
#. Description
#: ../linux-patch-grsecurity2.templates:2001
msgid ""
"Quoting upstream: \"During the audit, a critical vulnerability was found in "
"the RBAC system that effectively gave every subject the \"O\" flag, allowing "
"a root user for instance to gain the privileges of any other process through "
"LD_PRELOAD or ptrace.\" Also, a number of other bugs were fixed in general, "
"including PaX. Please upgrade to this release as soon as you can."
msgstr ""
"For at citere opstrøm: »Under revisionen blev en kritisk sårbarhed fundet i "
"RBAC-systemet som effektivt gav alle emner flaget »0«, hvilket for eksempel "
"gav en administrator (root user) privilegier for alle andre processer via "
"LD_PRELOAD eller ptrace.« Et par andre fejl blev også rettet; inklusiv "
"PaX. Opgrader venligst til denne udgivelse så snart du kan."


Reply to: