[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-apple.fr.po propriet...
From: |
Therese Godefroy |
Subject: |
www/proprietary/po malware-apple.fr.po propriet... |
Date: |
Thu, 4 Aug 2016 06:31:13 +0000 (UTC) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 16/08/04 06:31:13
Modified files:
proprietary/po : malware-apple.fr.po
proprietary-insecurity.fr.po
Log message:
Update.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.56&r2=1.57
Patches:
Index: malware-apple.fr.po
===================================================================
RCS file: /webcvs/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- malware-apple.fr.po 4 Aug 2016 01:29:29 -0000 1.52
+++ malware-apple.fr.po 4 Aug 2016 06:31:13 -0000 1.53
@@ -8,14 +8,13 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"POT-Creation-Date: 2016-08-04 01:26+0000\n"
-"PO-Revision-Date: 2016-07-09 11:21+0200\n"
+"PO-Revision-Date: 2016-08-04 08:29+0200\n"
"Last-Translator: Sébastien Poher <sbphr @T volted.net>\n"
"Language-Team: French <address@hidden>\n"
"Language: fr\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-04 01:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -257,6 +256,11 @@
"iphone-imessage-apple\">execute malacious code from any application which "
"uses this API to render a certain kind of image file</a>."
msgstr ""
+"Une vulnérabilité dans l'interface de programmation (API) <cite>Image I/O</"
+"cite> d'Apple permettait à un attaquant <a href=\"https://www.theguardian."
+"com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple\"> "
+"d'exécuter du code malveillant à partir de toute application utilisant
cette "
+"API pour afficher un certain type de fichier image</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /webcvs/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-insecurity.fr.po 4 Aug 2016 01:29:29 -0000 1.56
+++ proprietary-insecurity.fr.po 4 Aug 2016 06:31:13 -0000 1.57
@@ -8,14 +8,13 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"POT-Creation-Date: 2016-08-04 01:26+0000\n"
-"PO-Revision-Date: 2016-07-31 11:26+0200\n"
+"PO-Revision-Date: 2016-08-04 08:29+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
"Language: fr\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-04 01:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -69,6 +68,11 @@
"iphone-imessage-apple\">execute malacious code from any application which "
"uses this API to render a certain kind of image file</a>."
msgstr ""
+"Une vulnérabilité dans l'interface de programmation (API) <cite>Image I/O</"
+"cite> d'Apple permettait à un attaquant <a href=\"https://www.theguardian."
+"com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple\"> "
+"d'exécuter du code malveillant à partir de toute application utilisant
cette "
+"API pour afficher un certain type de fichier image</a>."
#. type: Content of: <ul><li><p>
msgid ""
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po malware-apple.fr.po propriet...,
Therese Godefroy <=