[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.nl.html po/malwar...
From: |
GNUN |
Subject: |
www/proprietary malware-apple.nl.html po/malwar... |
Date: |
Thu, 4 Aug 2016 01:29:31 +0000 (UTC) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 16/08/04 01:29:30
Modified files:
proprietary : malware-apple.nl.html
proprietary/po : malware-apple.de.po malware-apple.es.po
malware-apple.fr.po malware-apple.it.po
malware-apple.ja.po malware-apple.nl-diff.html
malware-apple.nl.po malware-apple.pot
malware-apple.ru.po
proprietary-insecurity.de.po
proprietary-insecurity.fr.po
proprietary-insecurity.it.po
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.nl.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.70&r2=1.71
Patches:
Index: malware-apple.nl.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.nl.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-apple.nl.html 1 Jul 2016 22:58:55 -0000 1.3
+++ malware-apple.nl.html 4 Aug 2016 01:29:27 -0000 1.4
@@ -1,6 +1,6 @@
<!--#set var="PO_FILE"
value='<a href="/proprietary/po/malware-apple.nl.po">
- http://www.gnu.org/proprietary/po/malware-apple.nl.po</a>'
+ https://www.gnu.org/proprietary/po/malware-apple.nl.po</a>'
--><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-apple.html"
--><!--#set var="DIFF_FILE" value="/proprietary/po/malware-apple.nl-diff.html"
--><!--#set var="OUTDATED_SINCE" value="2016-04-14" -->
@@ -442,7 +442,7 @@
<p class="unprintable"><!-- timestamp start -->
Bijgewerkt:
-$Date: 2016/07/01 22:58:55 $
+$Date: 2016/08/04 01:29:27 $
<!-- timestamp end -->
</p>
Index: po/malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/malware-apple.de.po 1 Jul 2016 22:58:56 -0000 1.47
+++ po/malware-apple.de.po 4 Aug 2016 01:29:28 -0000 1.48
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: 2016-06-16 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: www-de <address@hidden>\n"
@@ -268,6 +268,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in the iThings Messages app <a href=\"https://theintercept."
"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
"a malicious web site to extract all the user's messaging history</a>."
Index: po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- po/malware-apple.es.po 17 Jul 2016 09:58:35 -0000 1.54
+++ po/malware-apple.es.po 4 Aug 2016 01:29:29 -0000 1.55
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
"X-Generator: Poedit 1.6.10\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -255,6 +256,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in the iThings Messages app <a href=\"https://theintercept."
"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
"a malicious web site to extract all the user's messaging history</a>."
Index: po/malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- po/malware-apple.fr.po 9 Jul 2016 09:28:21 -0000 1.51
+++ po/malware-apple.fr.po 4 Aug 2016 01:29:29 -0000 1.52
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: 2016-07-09 11:21+0200\n"
"Last-Translator: Sébastien Poher <sbphr @T volted.net>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -251,6 +252,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in the iThings Messages app <a href=\"https://theintercept."
"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
"a malicious web site to extract all the user's messaging history</a>."
Index: po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/malware-apple.it.po 30 Jul 2016 17:29:54 -0000 1.55
+++ po/malware-apple.it.po 4 Aug 2016 01:29:29 -0000 1.56
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: 2016-07-30 18:05+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -247,6 +248,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in the iThings Messages app <a href=\"https://theintercept."
"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
"a malicious web site to extract all the user's messaging history</a>."
Index: po/malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/malware-apple.ja.po 7 Jul 2016 01:29:33 -0000 1.49
+++ po/malware-apple.ja.po 4 Aug 2016 01:29:29 -0000 1.50
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: 2016-07-07 09:52+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -242,6 +243,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in the iThings Messages app <a href=\"https://theintercept."
"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
"a malicious web site to extract all the user's messaging history</a>."
Index: po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-apple.nl-diff.html 1 Jul 2016 22:58:56 -0000 1.2
+++ po/malware-apple.nl-diff.html 4 Aug 2016 01:29:29 -0000 1.3
@@ -136,6 +136,13 @@
<ul>
<li>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker
+ to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses this API to render
+ a certain kind of image file</a>.</p>
+ </li>
+
+ <li>
<p>A bug in the iThings Messages
app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
a malicious web site to extract all the user's messaging
history</a>.
@@ -444,7 +451,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/07/01 22:58:56 $
+$Date: 2016/08/04 01:29:29 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-apple.nl.po 1 Jul 2016 22:58:56 -0000 1.9
+++ po/malware-apple.nl.po 4 Aug 2016 01:29:29 -0000 1.10
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: 2016-04-09 14:33+0100\n"
"Last-Translator: Tom Uijldert <address@hidden>\n"
"Language-Team: Dutch\n"
@@ -259,6 +259,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in the iThings Messages app <a href=\"https://theintercept."
"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
"a malicious web site to extract all the user's messaging history</a>."
Index: po/malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/malware-apple.pot 1 Jul 2016 22:58:56 -0000 1.25
+++ po/malware-apple.pot 4 Aug 2016 01:29:29 -0000 1.26
@@ -1,4 +1,4 @@
-# LANGUAGE translation of http://www.gnu.org/proprietary/malware-apple.html
+# LANGUAGE translation of https://www.gnu.org/proprietary/malware-apple.html
# Copyright (C) YEAR Free Software Foundation, Inc.
# This file is distributed under the same license as the original article.
# FIRST AUTHOR <address@hidden>, YEAR.
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -191,6 +191,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a "
+"href=\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple\">execute
"
+"malacious code from any application which uses this API to render a certain "
+"kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in the iThings Messages app <a "
"href=\"https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed
"
"a malicious web site to extract all the user's messaging history</a>."
Index: po/malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- po/malware-apple.ru.po 2 Jul 2016 04:59:01 -0000 1.70
+++ po/malware-apple.ru.po 4 Aug 2016 01:29:29 -0000 1.71
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2016-07-01 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: 2016-07-02 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -247,6 +248,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in the iThings Messages app <a href=\"https://theintercept."
"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
"a malicious web site to extract all the user's messaging history</a>."
Index: po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- po/proprietary-insecurity.de.po 29 Jul 2016 22:58:00 -0000 1.43
+++ po/proprietary-insecurity.de.po 4 Aug 2016 01:29:29 -0000 1.44
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: 2016-05-17 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: www-de <address@hidden>\n"
@@ -60,6 +60,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
"cell phones and routers, <a href=\"http://arstechnica.com/security/2016/07/"
"software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"
Index: po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- po/proprietary-insecurity.fr.po 31 Jul 2016 09:27:13 -0000 1.55
+++ po/proprietary-insecurity.fr.po 4 Aug 2016 01:29:29 -0000 1.56
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: 2016-07-31 11:26+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -63,6 +64,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
"cell phones and routers, <a href=\"http://arstechnica.com/security/2016/07/"
"software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"
Index: po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- po/proprietary-insecurity.it.po 30 Jul 2016 17:29:54 -0000 1.60
+++ po/proprietary-insecurity.it.po 4 Aug 2016 01:29:30 -0000 1.61
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: 2016-07-30 18:16+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -61,6 +62,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
"cell phones and routers, <a href=\"http://arstechnica.com/security/2016/07/"
"software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"
Index: po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/proprietary-insecurity.ja.po 29 Jul 2016 22:58:00 -0000 1.53
+++ po/proprietary-insecurity.ja.po 4 Aug 2016 01:29:30 -0000 1.54
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: 2016-07-12 14:41+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -61,6 +61,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
"cell phones and routers, <a href=\"http://arstechnica.com/security/2016/07/"
"software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"
Index: po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/proprietary-insecurity.pot 29 Jul 2016 22:58:00 -0000 1.29
+++ po/proprietary-insecurity.pot 4 Aug 2016 01:29:30 -0000 1.30
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -48,6 +48,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a "
+"href=\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple\">execute
"
+"malacious code from any application which uses this API to render a certain "
+"kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
"cell phones and routers, <a "
"href=\"http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover\">allows
"
Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- po/proprietary-insecurity.ru.po 2 Aug 2016 16:59:16 -0000 1.70
+++ po/proprietary-insecurity.ru.po 4 Aug 2016 01:29:30 -0000 1.71
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2016-07-29 22:55+0000\n"
+"POT-Creation-Date: 2016-08-04 01:26+0000\n"
"PO-Revision-Date: 2016-08-02 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-08-04 01:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -61,6 +62,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A vulnerability in Apple's Image I/O API allowed an attacker to <a href="
+"\"https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-"
+"iphone-imessage-apple\">execute malacious code from any application which "
+"uses this API to render a certain kind of image file</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A bug in a proprietary ASN.1 library, used in cell phone towers as well as "
"cell phones and routers, <a href=\"http://arstechnica.com/security/2016/07/"
"software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-apple.nl.html po/malwar...,
GNUN <=