Your message dated Tue, 17 Oct 2006 05:32:09 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#389288: fixed in cgiemail 1.6-31
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: cgiemail
Version: 1.6-30
Tags: l10n, patch
Severity: wishlist

Portuguese (pt) translation for cgiemail's debconf messages
by Ricardo Silva <ardoric _at_ gmail.com>.
Feel free to use it.

For translation updated please contact Ricardo Silva and CC the Portuguese
translation team <traduz _at_ debianpt.org>






# Portuguese translation for cgiemail's debconf messages
# This file is distributed under the same license as the cgiemail package.
# Ricardo Silva <[EMAIL PROTECTED]>, 2006.
#
msgid ""
msgstr ""
"Project-Id-Version: cgiemail 1.6-30\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2006-09-09 11:48-0600\n"
"PO-Revision-Date: 2006-09-21 23:19+0100\n"
"Last-Translator: Ricardo Silva <[EMAIL PROTECTED]>\n"
"Language-Team: Portuguese <[EMAIL PROTECTED]>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"

#. Type: string
#. Description
#: ../templates:1001
msgid "Where do you want to put cgiemail's mail templates?"
msgstr "Onde deseja colocar os 'templates' de email do cgiemail?"

#. Type: string
#. Description
#: ../templates:1001
msgid ""
"In old versions of cgiemail, templates that were used for creating e-mails "
"to be sent could be placed anywhere that would be served up by the web "
"server.  This behaviour is a security vulnerability: an attacker can read "
"files that he shouldn't be able to, such as scripts in cgi-bin, if they "
"contain certain pieces of text."
msgstr ""
"Em versões antigas do cgiemail, os 'templates' que eram usados para criar "
"os emails a enviar podiam ser colocados em qualquer sitio onde pudessem "
"ser servidos pelo servidor web. Este comportamento é uma vulnerabilidade "
"de segurança: um atacante pode ler ficheiros que não devia, como 'scripts' "
"em cgi-bin, se contiverem certas partes em texto."

#. Type: string
#. Description
#: ../templates:1001
msgid ""
"If you enter nothing (that is, erase the default directory, leaving this "
"empty), cgiemail will still work. This may be needed if you are, for "
"instance, hosting web services, and cannot move all of your clients cgiemail "
"templates to one directory.  Remember that this will LEAVE THE SECURITY HOLE "
"OPEN, and is only a choice for backwards compatibility."
msgstr ""
"Se não introduzir nada (isto é, apagar o directório por omissão e deixar o 
campo "
"vazio), o cgiemail ainda funcionará. Isto pode ser necessário se for, por "
"exemplo, abrigar servidores web e não puder mover todos os 'templates' do "
"cgiemail dos seus clientes para um único directório. Lembre-se que isto vai "
"DEIXAR O 'BURACO' DE SEGURANÇA ABERTO, e é apenas uma escolha para " 
"retrocompatibilidade."

#. Type: string
#. Description
#: ../templates:1001
msgid ""
"To close the hole, enter a directory, which MUST be accessible by your web "
"server.  Template files that you want to use should go there. For further "
"instructions, please read the README.Debian and README files in /usr/share/"
"doc/cgiemail/."
msgstr ""
"Para fechar o 'buraco', introduza um directório, que TEM de estar acessível 
pelo "
"seu servidor web. Os ficheiros de 'template' que quiser devem ir para esse "
"directório. Para mais instruções, por favor leia os ficheiros README.Debian 
"
"e README em /usr/share/doc/cgiemail/."

--- End Message ---
--- Begin Message ---
Source: cgiemail
Source-Version: 1.6-31

We believe that the bug you reported is fixed in the latest version of
cgiemail, which is due to be installed in the Debian FTP archive:

cgiemail_1.6-31.diff.gz
  to pool/main/c/cgiemail/cgiemail_1.6-31.diff.gz
cgiemail_1.6-31.dsc
  to pool/main/c/cgiemail/cgiemail_1.6-31.dsc
cgiemail_1.6-31_i386.deb
  to pool/main/c/cgiemail/cgiemail_1.6-31_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anibal Monsalve Salazar <[EMAIL PROTECTED]> (supplier of updated cgiemail 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 17 Oct 2006 22:06:40 +1000
Source: cgiemail
Binary: cgiemail
Architecture: source i386
Version: 1.6-31
Distribution: unstable
Urgency: low
Maintainer: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
Changed-By: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
Description: 
 cgiemail   - CGI Form-to-Mail converter
Closes: 389288
Changes: 
 cgiemail (1.6-31) unstable; urgency=low
 .
   * Added Portuguese translation of the debconf templates, closes: #389288.
     Patch by Ricardo Silva <[EMAIL PROTECTED]>.
Files: 
 214828693ab57e9ab0b074d61b38ee6e 573 web optional cgiemail_1.6-31.dsc
 f2f1f754b5eb1dc694e36e0f43083c56 22678 web optional cgiemail_1.6-31.diff.gz
 b4c9fd75f087101b0d68f7405d0a0b5e 39568 web optional cgiemail_1.6-31_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFFNMq4ipBneRiAKDwRAiZIAJ44CmNcasUuFBFkdMDeJWOSlc1qowCgqefU
lQ04BucGmplGTBCtGm4Mb+k=
=9/fi
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to