Package: kernel-patch-grsecurity2 Version: N/A Severity: wishlist Tags: patch l10n
Hello, Please find the attached fr.po file, which is an update of the french translation of the debconf templates. This file has been reviewed by the contributors of the debian-l10n-french mailing-list. In this file, the two last templates are translated. Thanks.
# # Translators, if you are not familiar with the PO format, gettext # documentation is worth reading, especially sections dedicated to # this format, e.g. by running: # info -n '(gettext)PO Files' # info -n '(gettext)Header Entry' # # Some information specific to po-debconf are available at # /usr/share/doc/po-debconf/README-trans # or http://www.debian.org/intl/l10n/po-debconf/README-trans # # Developers do not need to manually edit POT or PO files. # msgid "" msgstr "" "Project-Id-Version: kernel-patch-grsecurity2\n" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2005-03-07 22:20+0100\n" "PO-Revision-Date: 2005-03-13 23:55+0200\n" "Last-Translator: Eric Madesclair <[EMAIL PROTECTED]>\n" "Language-Team: French <debian-l10n-french@lists.debian.org>\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=ISO-8859-1\n" "Content-Transfer-Encoding: 8bit\n" #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:3 msgid "Incompatibility with Debian kernels 2.4.20 to 2.4.26" msgstr "Incompatibilité avec les noyaux 2.4.20 à 2.4.26 de Debian" #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:3 msgid "" "Due to backports and other packaging decisions by the kernel maintainer with " "respect to the kernel-source packages for kernels 2.4.20 and upwards, the " "grsecurity patch will *not* apply to the Debian kernels anymore. You may " "read more about this in /usr/share/doc/kernel-patch-2.4-grsecurity/" "README.2.4.2x. If you want to apply this patch, please use a vanilla kernel " "source tree, or please use the modified version for 2.4.27 and hopefully " "upwards by the kernel-patch-grsecurity2 maintainer (but bugs found only in " "the latter should not be sent to upstream, but to the Debian BTS). Also note " "that 2.6.x versions of kernel are unaffected." msgstr "" "En raison des rétro-portages (« backports ») et autres décisions " "d'empaquetage prises par le responsable des paquets « kernel-source » pour " "les noyaux 2.4.20 et supérieurs, la rustine (« patch ») grsecurity ne pourra " "plus être appliquée aux noyaux Debian. Veuillez consulter /usr/share/doc/" "kernel-patch-2.4-grsecurity/README.2.4.2x pour plus d'informations. Si vous " "désirez appliquer ce correctif, veuillez utiliser les noyaux originaux, ou " "les noyaux 2.4.27 et supérieurs, modifiés par le responsable de kernel-patch-" "grsecurity2 (Les bogues rencontrés ne doivent pas être rapportés au " "développeur amont, mais au système de suivi des bogues de Debian). Veuillez " "aussi noter que cette restriction ne concerne pas les versions 2.6.x du " "noyau." #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:16 msgid "The 2.1.2 release is a security bugfix release, please upgrade!" msgstr "" "La version 2.1.2 corrige un bogue de sécurité, mise à niveau indispensable" #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:16 msgid "" "In the included PaX patch a security bug was found. It affects kernels with " "SEGMEXEC or RANDEXEC enabled (the predefined LOW and MEDIUM options do not " "contain these). All users are encouraged to upgrade soon as the bug is " "localy (and maybe remotely) exploitable; if you can not upgrade, then echo " "\"0 0\" > /proc/sys/vm/pagetable_cache would reduce the risk, but patching " "is still unavoidable. References: http://lists.netsys.com/pipermail/full-" "disclosure/2005-March/032240.html http://www.grsecurity.net/news.php#grsec212" msgstr "" "Dans la rustine PaX, un bogue concernant la sécurité a été trouvé. Ce bogue " "concerne seulement les noyaux qui ont les options SEGMEXEC ou RANDEXEC " "activées (ces options ne sont pas activées avec les niveaux prédéfinis LOW " "et MEDIUM de grsecurity). Vous devriez mettre à niveau votre système car le " "bogue peut être exploité localement (et peut-être à distance). Si vous ne " "pouvez pas le mettre à niveau, utilisez la commande : « echo \"0 0\" > /proc/" "sys/vm/pagetable_cache » pour réduire les risques, mais cela ne doit être " "que temporaire en attendant la mise à niveau indispensable. Pour plus " "d'information, reportez-vous aux adresses : http://lists.netsys.com/" "pipermail/full-disclosure/2005-March/032240.html et http://www.grsecurity." "net/news.php#grsec212." #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:29 msgid "The 2.1.3 release again a security bugfix release, please upgrade!" msgstr "" "La version 2.1.3 corrige un bogue de sécurité, mise à niveau indispensable" #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:29 msgid "" "Quoting upstream: \"During the audit, a critical vulnerability was found in " "the RBAC system that effectively gave every subject the \"O\" flag, allowing " "a root user for instance to gain the privileges of any other process through " "LD_PRELOAD or ptrace.\" Also, a number of other bugs were fixed in general, " "including PaX. Please upgrade to this release as soon as you can." msgstr "" "D'àpres les développeurs amont : « Durant l'audit, une faille critique a été " "découverte dans le système RBAC qui positionne pour chaque personne le " "drapeau \"O\", permettant au superutilisateur d'obtenir les privilèges de " "n'importe quel autre processus par LD_preload ou ptrace ». De plus, un " "certain nombre d'autres bogues ont été corrigés, y compris a mise à niveau " "de PaX. Procédez à la mise à niveau dès que vous le pourrez."