www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-apple.fr.po propriet...


From: Therese Godefroy
Subject: www/proprietary/po malware-apple.fr.po propriet...
Date: Thu, 4 Aug 2016 06:31:13 +0000 (UTC)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 16/08/04 06:31:13

Modified files:
        proprietary/po : malware-apple.fr.po 
                         proprietary-insecurity.fr.po 

Log message:
        Update.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.56&r2=1.57

Patches:
Index: malware-apple.fr.po
===================================================================
RCS file: /webcvs/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- malware-apple.fr.po 4 Aug 2016 01:29:29 -0000       1.52
+++ malware-apple.fr.po 4 Aug 2016 06:31:13 -0000       1.53
@@ -8,14 +8,13 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "POT-Creation-Date: 2016-08-04 01:26+0000\n"
-"PO-Revision-Date: 2016-07-09 11:21+0200\n"
+"PO-Revision-Date: 2016-08-04 08:29+0200\n"
 "Last-Translator: Sébastien Poher <sbphr @T volted.net>\n"
 "Language-Team: French <address@hidden>\n"
 "Language: fr\n"
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-04 01:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -257,6 +256,11 @@
 "iphone-imessage-apple\">execute malacious code from any application which "
 "uses this API to render a certain kind of image file</a>."
 msgstr ""
+"Une vulnérabilité dans l'interface de programmation (API) <cite>Image I/O</"
+"cite> d'Apple permettait à un attaquant <a href=\"https://www.theguardian.";
+"com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple\"> "
+"d'exécuter du code malveillant à partir de toute application utilisant 
cette "
+"API pour afficher un certain type de fichier image</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /webcvs/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-insecurity.fr.po        4 Aug 2016 01:29:29 -0000       1.56
+++ proprietary-insecurity.fr.po        4 Aug 2016 06:31:13 -0000       1.57
@@ -8,14 +8,13 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "POT-Creation-Date: 2016-08-04 01:26+0000\n"
-"PO-Revision-Date: 2016-07-31 11:26+0200\n"
+"PO-Revision-Date: 2016-08-04 08:29+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
 "Language: fr\n"
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-04 01:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -69,6 +68,11 @@
 "iphone-imessage-apple\">execute malacious code from any application which "
 "uses this API to render a certain kind of image file</a>."
 msgstr ""
+"Une vulnérabilité dans l'interface de programmation (API) <cite>Image I/O</"
+"cite> d'Apple permettait à un attaquant <a href=\"https://www.theguardian.";
+"com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple\"> "
+"d'exécuter du code malveillant à partir de toute application utilisant 
cette "
+"API pour afficher un certain type de fichier image</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]