www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po proprietary-insecurity.de.po...


From: GNUN
Subject: www/proprietary/po proprietary-insecurity.de.po...
Date: Sat, 10 Jun 2017 20:28:49 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/06/10 20:28:49

Modified files:
        proprietary/po : proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.125&r2=1.126

Patches:
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary-insecurity.de.po        2 Jun 2017 21:28:50 -0000       1.78
+++ proprietary-insecurity.de.po        11 Jun 2017 00:28:49 -0000      1.79
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-06-02 21:26+0000\n"
+"POT-Creation-Date: 2017-06-11 00:26+0000\n"
 "PO-Revision-Date: 2017-05-06 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -95,6 +95,18 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)  pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt";
+"\">according to modzero</a> the &ldquo;information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics&rdquo;."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The proprietary code that runs pacemakers, insulin pumps, and other medical "
 "devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\";> full "
 "of gross security faults</a>."

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary-insecurity.fr.po        3 Jun 2017 07:26:54 -0000       1.97
+++ proprietary-insecurity.fr.po        11 Jun 2017 00:28:49 -0000      1.98
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-02 21:26+0000\n"
+"POT-Creation-Date: 2017-06-11 00:26+0000\n"
 "PO-Revision-Date: 2017-06-03 09:25+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-06-11 00:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -97,6 +98,18 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)  pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt";
+"\">according to modzero</a> the &ldquo;information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics&rdquo;."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The proprietary code that runs pacemakers, insulin pumps, and other medical "
 "devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\";> full "
 "of gross security faults</a>."

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary-insecurity.it.po        9 Jun 2017 21:58:20 -0000       1.106
+++ proprietary-insecurity.it.po        11 Jun 2017 00:28:49 -0000      1.107
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-02 21:26+0000\n"
+"POT-Creation-Date: 2017-06-11 00:26+0000\n"
 "PO-Revision-Date: 2017-06-09 23:35+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-06-11 00:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -94,6 +95,18 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)  pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt";
+"\">according to modzero</a> the &ldquo;information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics&rdquo;."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The proprietary code that runs pacemakers, insulin pumps, and other medical "
 "devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\";> full "
 "of gross security faults</a>."

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-insecurity.ja-diff.html 2 Jun 2017 21:28:50 -0000       1.8
+++ proprietary-insecurity.ja-diff.html 11 Jun 2017 00:28:49 -0000      1.9
@@ -49,9 +49,21 @@
 users helpless is what's culpable about proprietary 
software.&lt;/p&gt;</em></ins></span>
 
 &lt;ul&gt;
-
 &lt;li&gt;
-<span class="inserted"><ins><em>&lt;p&gt;The proprietary code that runs 
pacemakers, insulin pumps, and other
+  <span class="inserted"><ins><em>&lt;p&gt;
+    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+    pre-installed on 28 models of HP laptops logged the user's
+    keystroke to a file in the filesystem. Any process with access to
+    the filesystem or the MapViewOfFile API could gain access to the
+    log. Furthermore, &lt;a 
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
+    to modzero&lt;/a&gt; the &ldquo;information-leak via Covert Storage
+    Channel enables malware authors to capture keystrokes without
+    taking the risk of being classified as malicious task by AV
+    heuristics&rdquo;.
+  &lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
 medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full of gross security faults&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
@@ -498,7 +510,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/06/02 21:28:50 $
+$Date: 2017/06/11 00:28:49 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary-insecurity.ja.po        2 Jun 2017 21:28:50 -0000       1.81
+++ proprietary-insecurity.ja.po        11 Jun 2017 00:28:49 -0000      1.82
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-02 21:26+0000\n"
+"POT-Creation-Date: 2017-06-11 00:26+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -94,6 +94,18 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)  pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt";
+"\">according to modzero</a> the &ldquo;information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics&rdquo;."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The proprietary code that runs pacemakers, insulin pumps, and other medical "
 "devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\";> full "
 "of gross security faults</a>."

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-insecurity.pot  2 Jun 2017 21:28:50 -0000       1.51
+++ proprietary-insecurity.pot  11 Jun 2017 00:28:49 -0000      1.52
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-02 21:26+0000\n"
+"POT-Creation-Date: 2017-06-11 00:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -68,6 +68,18 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)  "
+"pre-installed on 28 models of HP laptops logged the user's keystroke to a "
+"file in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a "
+"href=\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt\";>according
 "
+"to modzero</a> the &ldquo;information-leak via Covert Storage Channel "
+"enables malware authors to capture keystrokes without taking the risk of "
+"being classified as malicious task by AV heuristics&rdquo;."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The proprietary code that runs pacemakers, insulin pumps, and other medical "
 "devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\";> full "
 "of gross security faults</a>."

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary-insecurity.ru.po        3 Jun 2017 05:31:35 -0000       1.125
+++ proprietary-insecurity.ru.po        11 Jun 2017 00:28:49 -0000      1.126
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-06-02 21:26+0000\n"
+"POT-Creation-Date: 2017-06-11 00:26+0000\n"
 "PO-Revision-Date: 2017-06-03 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-06-11 00:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -95,6 +96,18 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)  pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt";
+"\">according to modzero</a> the &ldquo;information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics&rdquo;."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The proprietary code that runs pacemakers, insulin pumps, and other medical "
 "devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\";> full "
 "of gross security faults</a>."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]