Hi Hideki, On Sun, 2005-05-29 at 05:22 +0900, Hideki Yamane wrote: > It's OK. But it seems that there is no change in template.pot... Hmmm? I am sure that I sent you the updated one. It should have "Incompatibility with Debian kernels 2.4.20 to 2.4.26" changed to "Incompatibility with Debian kernels 2.4.20 and upwards". Checking my sent mails I see that I have sent you the newest templates.pot . I will send it again, can you please recheck it? Also it is downloadable from http://www.barcikacomp.hu/debian/ (it is in the package).
Cheers, Laszlo/GCS -- BorsodChem Joint-Stock Company www.debian.org Linux Support Center Software engineer Debian Developer Developer +36-48-511211/25-90 +36-20-4441745
# # Translators, if you are not familiar with the PO format, gettext # documentation is worth reading, especially sections dedicated to # this format, e.g. by running: # info -n '(gettext)PO Files' # info -n '(gettext)Header Entry' # # Some information specific to po-debconf are available at # /usr/share/doc/po-debconf/README-trans # or http://www.debian.org/intl/l10n/po-debconf/README-trans # # Developers do not need to manually edit POT or PO files. # #, fuzzy msgid "" msgstr "" "Project-Id-Version: PACKAGE VERSION\n" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2005-05-28 13:39+0200\n" "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" "Last-Translator: FULL NAME <[EMAIL PROTECTED]>\n" "Language-Team: LANGUAGE <[EMAIL PROTECTED]>\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=CHARSET\n" "Content-Transfer-Encoding: 8bit\n" #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:3 msgid "Incompatibility with Debian kernels 2.4.20 and upwards" msgstr "" #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:3 msgid "" "Due to backports and other packaging decisions by the kernel maintainer with " "respect to the kernel-source packages for kernels 2.4.20 and upwards, the " "grsecurity patch will *not* apply to the Debian kernels anymore. You may " "read more about this in /usr/share/doc/kernel-patch-2.4-grsecurity/" "README.2.4.2x. If you want to apply this patch, please use a vanilla kernel " "source tree, or please use the modified version for 2.4.27 and hopefully " "upwards by the kernel-patch-grsecurity2 maintainer (but bugs found only in " "the latter should not be sent to upstream, but to the Debian BTS)." msgstr "" #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:15 msgid "The 2.1.2 release is a security bugfix release, please upgrade!" msgstr "" #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:15 msgid "" "In the included PaX patch a security bug was found. It affects kernels with " "SEGMEXEC or RANDEXEC enabled (the predefined LOW and MEDIUM options do not " "contain these). All users are encouraged to upgrade soon as the bug is " "localy (and maybe remotely) exploitable; if you can not upgrade, then echo " "\"0 0\" > /proc/sys/vm/pagetable_cache would reduce the risk, but patching " "is still unavoidable. References: http://lists.netsys.com/pipermail/full-" "disclosure/2005-March/032240.html http://www.grsecurity.net/news.php#grsec212" msgstr "" #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:28 msgid "The 2.1.3 release again a security bugfix release, please upgrade!" msgstr "" #. Type: text #. Description #: ../kernel-patch-grsecurity2.templates:28 msgid "" "Quoting upstream: \"During the audit, a critical vulnerability was found in " "the RBAC system that effectively gave every subject the \"O\" flag, allowing " "a root user for instance to gain the privileges of any other process through " "LD_PRELOAD or ptrace.\" Also, a number of other bugs were fixed in general, " "including PaX. Please upgrade to this release as soon as you can." msgstr ""
signature.asc
Description: This is a digitally signed message part