www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.nl.html po/malwar...


From: GNUN
Subject: www/proprietary malware-apple.nl.html po/malwar...
Date: Thu, 4 Aug 2016 01:29:31 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/08/04 01:29:30

Modified files:
        proprietary    : malware-apple.nl.html 
        proprietary/po : malware-apple.de.po malware-apple.es.po 
                         malware-apple.fr.po malware-apple.it.po 
                         malware-apple.ja.po malware-apple.nl-diff.html 
                         malware-apple.nl.po malware-apple.pot 
                         malware-apple.ru.po 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.nl.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.70&r2=1.71

Patches:
Index: malware-apple.nl.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.nl.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-apple.nl.html       1 Jul 2016 22:58:55 -0000       1.3
+++ malware-apple.nl.html       4 Aug 2016 01:29:27 -0000       1.4
@@ -1,6 +1,6 @@
 <!--#set var="PO_FILE"
  value='<a href="/proprietary/po/malware-apple.nl.po">
- http://www.gnu.org/proprietary/po/malware-apple.nl.po</a>'
+ https://www.gnu.org/proprietary/po/malware-apple.nl.po</a>'
  --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
  --><!--#set var="DIFF_FILE" value="/proprietary/po/malware-apple.nl-diff.html"
  --><!--#set var="OUTDATED_SINCE" value="2016-04-14" -->
@@ -442,7 +442,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Bijgewerkt:
 
-$Date: 2016/07/01 22:58:55 $
+$Date: 2016/08/04 01:29:27 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/malware-apple.de.po      1 Jul 2016 22:58:56 -0000       1.47
+++ po/malware-apple.de.po      4 Aug 2016 01:29:28 -0000       1.48
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: 2016-06-16 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: www-de <address@hidden>\n"
@@ -268,6 +268,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in the iThings Messages app <a href=\"https://theintercept.";
 "com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
 "a malicious web site to extract all the user's messaging history</a>."

Index: po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- po/malware-apple.es.po      17 Jul 2016 09:58:35 -0000      1.54
+++ po/malware-apple.es.po      4 Aug 2016 01:29:29 -0000       1.55
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
 "X-Generator: Poedit 1.6.10\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -255,6 +256,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in the iThings Messages app <a href=\"https://theintercept.";
 "com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
 "a malicious web site to extract all the user's messaging history</a>."

Index: po/malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- po/malware-apple.fr.po      9 Jul 2016 09:28:21 -0000       1.51
+++ po/malware-apple.fr.po      4 Aug 2016 01:29:29 -0000       1.52
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: 2016-07-09 11:21+0200\n"
 "Last-Translator: Sébastien Poher <sbphr @T volted.net>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -251,6 +252,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in the iThings Messages app <a href=\"https://theintercept.";
 "com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
 "a malicious web site to extract all the user's messaging history</a>."

Index: po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/malware-apple.it.po      30 Jul 2016 17:29:54 -0000      1.55
+++ po/malware-apple.it.po      4 Aug 2016 01:29:29 -0000       1.56
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: 2016-07-30 18:05+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -247,6 +248,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in the iThings Messages app <a href=\"https://theintercept.";
 "com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
 "a malicious web site to extract all the user's messaging history</a>."

Index: po/malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/malware-apple.ja.po      7 Jul 2016 01:29:33 -0000       1.49
+++ po/malware-apple.ja.po      4 Aug 2016 01:29:29 -0000       1.50
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: 2016-07-07 09:52+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -242,6 +243,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in the iThings Messages app <a href=\"https://theintercept.";
 "com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
 "a malicious web site to extract all the user's messaging history</a>."

Index: po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-apple.nl-diff.html       1 Jul 2016 22:58:56 -0000       1.2
+++ po/malware-apple.nl-diff.html       4 Aug 2016 01:29:29 -0000       1.3
@@ -136,6 +136,13 @@
 
 &lt;ul&gt;
   &lt;li&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
+    to &lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which uses this API to render
+    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
     &lt;p&gt;A bug in the iThings Messages
       app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
         a malicious web site to extract all the user's messaging 
history&lt;/a&gt;.
@@ -444,7 +451,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/07/01 22:58:56 $
+$Date: 2016/08/04 01:29:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-apple.nl.po      1 Jul 2016 22:58:56 -0000       1.9
+++ po/malware-apple.nl.po      4 Aug 2016 01:29:29 -0000       1.10
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: 2016-04-09 14:33+0100\n"
 "Last-Translator: Tom Uijldert <address@hidden>\n"
 "Language-Team: Dutch\n"
@@ -259,6 +259,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in the iThings Messages app <a href=\"https://theintercept.";
 "com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
 "a malicious web site to extract all the user's messaging history</a>."

Index: po/malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/malware-apple.pot        1 Jul 2016 22:58:56 -0000       1.25
+++ po/malware-apple.pot        4 Aug 2016 01:29:29 -0000       1.26
@@ -1,4 +1,4 @@
-# LANGUAGE translation of http://www.gnu.org/proprietary/malware-apple.html
+# LANGUAGE translation of https://www.gnu.org/proprietary/malware-apple.html
 # Copyright (C) YEAR Free Software Foundation, Inc.
 # This file is distributed under the same license as the original article.
 # FIRST AUTHOR <address@hidden>, YEAR.
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -191,6 +191,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a "
+"href=\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple\";>execute
 "
+"malacious code from any application which uses this API to render a certain "
+"kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in the iThings Messages app <a "
 
"href=\"https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\";>allowed
 "
 "a malicious web site to extract all the user's messaging history</a>."

Index: po/malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- po/malware-apple.ru.po      2 Jul 2016 04:59:01 -0000       1.70
+++ po/malware-apple.ru.po      4 Aug 2016 01:29:29 -0000       1.71
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: 2016-07-02 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -247,6 +248,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in the iThings Messages app <a href=\"https://theintercept.";
 "com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
 "a malicious web site to extract all the user's messaging history</a>."

Index: po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- po/proprietary-insecurity.de.po     29 Jul 2016 22:58:00 -0000      1.43
+++ po/proprietary-insecurity.de.po     4 Aug 2016 01:29:29 -0000       1.44
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: 2016-05-17 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: www-de <address@hidden>\n"
@@ -60,6 +60,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
 "cell phones and routers, <a href=\"http://arstechnica.com/security/2016/07/";
 "software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"

Index: po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/proprietary-insecurity.fr.po     31 Jul 2016 09:27:13 -0000      1.55
+++ po/proprietary-insecurity.fr.po     4 Aug 2016 01:29:29 -0000       1.56
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: 2016-07-31 11:26+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -63,6 +64,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
 "cell phones and routers, <a href=\"http://arstechnica.com/security/2016/07/";
 "software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"

Index: po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- po/proprietary-insecurity.it.po     30 Jul 2016 17:29:54 -0000      1.60
+++ po/proprietary-insecurity.it.po     4 Aug 2016 01:29:30 -0000       1.61
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: 2016-07-30 18:16+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -61,6 +62,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
 "cell phones and routers, <a href=\"http://arstechnica.com/security/2016/07/";
 "software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"

Index: po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/proprietary-insecurity.ja.po     29 Jul 2016 22:58:00 -0000      1.53
+++ po/proprietary-insecurity.ja.po     4 Aug 2016 01:29:30 -0000       1.54
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: 2016-07-12 14:41+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -61,6 +61,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
 "cell phones and routers, <a href=\"http://arstechnica.com/security/2016/07/";
 "software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"

Index: po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/proprietary-insecurity.pot       29 Jul 2016 22:58:00 -0000      1.29
+++ po/proprietary-insecurity.pot       4 Aug 2016 01:29:30 -0000       1.30
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -48,6 +48,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a "
+"href=\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple\";>execute
 "
+"malacious code from any application which uses this API to render a certain "
+"kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
 "cell phones and routers, <a "
 
"href=\"http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover\";>allows
 "

Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- po/proprietary-insecurity.ru.po     2 Aug 2016 16:59:16 -0000       1.70
+++ po/proprietary-insecurity.ru.po     4 Aug 2016 01:29:30 -0000       1.71
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
 "PO-Revision-Date: 2016-08-02 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -61,6 +62,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-";
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
 "cell phones and routers, <a href=\"http://arstechnica.com/security/2016/07/";
 "software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]