Package: linux-patch-grsecurity2 Severity: wishlist Tags: l10n patch Hi. Please find attached the Italian translation of linux-patch-grsecurity2 debconf messages proofread by the Italian localization team.
Please include it in your next upload. Thanks, Beatrice
# Italian translation of linux-patch-grsecurity2. # Copyright (C) 2012, linux-patch-grsecurity2 package copyright holder. # This file is distributed under the same license as # the linux-patch-grsecurity2 package. # Beatrice Torracca <beatri...@libero.it>, 2012. msgid "" msgstr "" "Project-Id-Version: linux-patch-grsecurity2\n" "Report-Msgid-Bugs-To: g...@debian.hu\n" "POT-Creation-Date: 2008-01-21 11:26-0500\n" "PO-Revision-Date: 2012-02-17 16:01+0200\n" "Last-Translator: Beatrice Torracca <beatri...@libero.it>\n" "Language-Team: Italian <debian-l10n-ital...@lists.debian.org>\n" "Language: it\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: 8bit\n" "Plural-Forms: nplurals=2; plural=(n != 1);\n" "X-Generator: Virtaal 0.7.1\n" #. Type: text #. Description #: ../linux-patch-grsecurity2.templates:1001 msgid "The 2.1.2 release is a security bugfix release, please upgrade!" msgstr "" "La versione 2.1.2 è una versione rilasciata per risolvere bug di sicurezza; " "aggiornare!" #. Type: text #. Description #: ../linux-patch-grsecurity2.templates:1001 msgid "" "In the included PaX patch a security bug was found. It affects kernels with " "SEGMEXEC or RANDEXEC enabled (the predefined LOW and MEDIUM options do not " "contain these). All users are encouraged to upgrade soon as the bug is " "locally (and maybe remotely) exploitable; if you can not upgrade, then echo " "\"0 0\" > /proc/sys/vm/pagetable_cache would reduce the risk, but patching " "is still unavoidable. References: http://lists.netsys.com/pipermail/full-" "disclosure/2005-March/032240.html http://www.grsecurity.net/news.php#grsec212" msgstr "" "Nella patch PaX inclusa è stato trovato un bug di sicurezza. Affligge i " "kernel con abilitato SEGMEXEC o RANDEXEC (le opzioni LOW e MEDIUM " "predefinite non li contengono). Tutti gli utenti sono incoraggiati ad " "aggiornare in tempi brevi dato che il bug è sfruttabile in locale (e forse " "da remoto); se non si può aggiornare, allora il comando echo \"0 0\" > " "/proc/sys/vm/pagetable_cache ridurrà il rischio ma l'applicazione di una " "patch è comunque inevitabile. Riferimenti: http://lists.netsys.com/pipermail" "/full-disclosure/2005-March/032240.html " "http://www.grsecurity.net/news.php#grsec212" #. Type: text #. Description #: ../linux-patch-grsecurity2.templates:2001 msgid "The 2.1.3 release is also a security bugfix release, please upgrade!" msgstr "" "Anche la versione 2.1.3 è una versione rilasciata per risolvere bug di " "sicurezza; aggiornare!" #. Type: text #. Description #: ../linux-patch-grsecurity2.templates:2001 msgid "" "Quoting upstream: \"During the audit, a critical vulnerability was found in " "the RBAC system that effectively gave every subject the \"O\" flag, allowing " "a root user for instance to gain the privileges of any other process through " "LD_PRELOAD or ptrace.\" Also, a number of other bugs were fixed in general, " "including PaX. Please upgrade to this release as soon as you can." msgstr "" "Citando gli autori originali: \"Durante il controllo, è stata trovata una " "vulnerabilità critica nel sistema RBAC che di fatto dà a qualsiasi persona " "il flag \"0\", permettendo ad esempio ad un utente root di ottenere i " "privilegi di qualsiasi altro processo attraverso LD_PRELOAD o ptrace.\" " "Inoltre, in generale, sono stati risolti diversi altri bug, incluso PaX. " "Aggiornare a questa versione il prima possibile."