-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Package: kernel-patch-grsecurity2
Version: 2.1.4-2
Severity: wishlist
Tags: patch l10n

Sorry for the late reply (well, you asked for an updated translation).

Please find attached the Dutch po-debconf translation.
Please add it to your next package revision, it should be inserted in
your package build-tree as debian/po/nl.po, TIA.

Feel free to mail me if this file needs updating at some future date.

Cheers

Luk
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCUVub5UTeB5t8Mo0RApTdAKCWV4QHB1W3ty6iUHqpeuQ0cuyE7ACfQkVy
jo2gC4x0pJt37DUM0qOy/do=
=gOIN
-----END PGP SIGNATURE-----
#
#    Translators, if you are not familiar with the PO format, gettext
#    documentation is worth reading, especially sections dedicated to
#    this format, e.g. by running:
#         info -n '(gettext)PO Files'
#         info -n '(gettext)Header Entry'
#
#    Some information specific to po-debconf are available at
#            /usr/share/doc/po-debconf/README-trans
#         or http://www.debian.org/intl/l10n/po-debconf/README-trans
#
#    Developers do not need to manually edit POT or PO files.
#
msgid ""
msgstr ""
"Project-Id-Version: kernel-patch-grsecurity2 2.0.1\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2005-03-05 16:06+0100\n"
"PO-Revision-Date: 2005-03-07 12:31+0100\n"
"Last-Translator: Luk Claes <[EMAIL PROTECTED]>\n"
"Language-Team: Debian l10n Dutch <debian-l10n-dutch@lists.debian.org>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"

#. Type: text
#. Description
#: ../kernel-patch-grsecurity2.templates:3
msgid "Incompatibility with Debian kernels 2.4.20 to 2.4.26"
msgstr "Incompatibel met Debian-kernels 2.4.20 tot 2.4.26"

#. Type: text
#. Description
#: ../kernel-patch-grsecurity2.templates:3
msgid "Due to backports and other packaging decisions by the kernel maintainer with respect to the kernel-source packages for kernels 2.4.20 and upwards, the grsecurity patch will *not* apply to the Debian kernels anymore. You may read more about this in /usr/share/doc/kernel-patch-2.4-grsecurity/README.2.4.2x. If you want to apply this patch, please use a vanilla kernel source tree, or please use the modified version for 2.4.27 and hopefully upwards by the kernel-patch-grsecurity2 maintainer (but bugs found only in the latter should not be sent to upstream, but to the Debian BTS). Also note that 2.6.x versions of kernel are unaffected."
msgstr "Door backports en andere pakketbeslissingen door de kernelbeheerder in verband met de kernel-source-pakketten voor kernels 2.4.20 en hoger, zal de grsecurity-patch *niet* meer werken met Debian-kernels. U kunt hier meer over lezen in /usr/share/doc/kernel-patch-2.4-grsecurity/README.2.4.2x. Als u deze patch wilt toepassen, gebruik dan de 'vanilla'-kernelbroncode of gebruik de aangepaste versie voor 2.4.27 en hopelijk hoger door de 'kernel-patch-grsecurity2'-beheerder (maar bugs in dit laatste moeten niet naar 'upstream' worden gestuurd, maar naar het Debian-BTS). Merk ook op dat 2.6.x-versies van de kernel er geen problemen mee opleveren."

#. Type: text
#. Description
#: ../kernel-patch-grsecurity2.templates:16
msgid "The 2.1.2 release is a security bugfix release, please upgrade!"
msgstr "De 2.1.2-release is een release die een veiligheidsprobleem oplost!"

#. Type: text
#. Description
#: ../kernel-patch-grsecurity2.templates:16
msgid "In the included PaX patch a security bug was found. It affects kernels with SEGMEXEC or RANDEXEC enabled (the predefined LOW and MEDIUM options do not contain these). All users are encouraged to upgrade soon as the bug is localy (and maybe remotely) exploitable; if you can not upgrade, then echo \"0 0\" > /proc/sys/vm/pagetable_cache would reduce the risk, but patching is still unavoidable. References: http://lists.netsys.com/pipermail/full-disclosure/2005-March/032240.html http://www.grsecurity.net/news.php#grsec212";
msgstr "In de bijgevoegde PaX-patch is een veiligheidsprobleem gevonden."

Reply via email to