88msgstr ""
99"Project-Id-Version : Python 3.7\n "
1010"Report-Msgid-Bugs-To : \n "
11- "POT-Creation-Date : 2018-06-30 05:56 +0900\n "
11+ "POT-Creation-Date : 2018-09-25 09:16 +0900\n "
1212"PO-Revision-Date : YEAR-MO-DA HO:MI+ZONE\n "
1313"Language-Team : Chinese (China) (https://www.transifex.com/python-doc/teams/5390/zh_CN/)\n "
1414"MIME-Version : 1.0\n "
@@ -130,19 +130,23 @@ msgstr ""
130130#: ../../library/xml.rst:66 ../../library/xml.rst:66 ../../library/xml.rst:66
131131#: ../../library/xml.rst:66 ../../library/xml.rst:66 ../../library/xml.rst:67
132132#: ../../library/xml.rst:67 ../../library/xml.rst:67 ../../library/xml.rst:67
133- #: ../../library/xml.rst:67 ../../library/xml.rst:68 ../../library/xml.rst:68
134- #: ../../library/xml.rst:69 ../../library/xml.rst:69 ../../library/xml.rst:70
133+ #: ../../library/xml.rst:67 ../../library/xml.rst:70
135134msgid "**Vulnerable**"
136135msgstr ""
137136
138137#: ../../library/xml.rst:67
139138msgid "quadratic blowup"
140139msgstr ""
141140
142- #: ../../library/xml.rst:68 ../../library/xml.rst:97
141+ #: ../../library/xml.rst:68 ../../library/xml.rst:99
143142msgid "external entity expansion"
144143msgstr ""
145144
145+ #: ../../library/xml.rst:68 ../../library/xml.rst:68 ../../library/xml.rst:69
146+ #: ../../library/xml.rst:69
147+ msgid "Safe (4)"
148+ msgstr ""
149+
146150#: ../../library/xml.rst:68
147151msgid "Safe (1)"
148152msgstr ""
@@ -155,7 +159,7 @@ msgstr ""
155159msgid "Safe (3)"
156160msgstr ""
157161
158- #: ../../library/xml.rst:69 ../../library/xml.rst:102
162+ #: ../../library/xml.rst:69 ../../library/xml.rst:104
159163msgid "`DTD`_ retrieval"
160164msgstr ""
161165
@@ -165,7 +169,7 @@ msgstr ""
165169msgid "Safe"
166170msgstr ""
167171
168- #: ../../library/xml.rst:70 ../../library/xml.rst:109
172+ #: ../../library/xml.rst:70 ../../library/xml.rst:111
169173msgid "decompression bomb"
170174msgstr ""
171175
@@ -185,11 +189,17 @@ msgstr ""
185189msgid ":mod:`xmlrpclib` doesn't expand external entities and omits them."
186190msgstr ""
187191
188- #: ../../library/xml.rst:85
192+ #: ../../library/xml.rst:78
193+ msgid ""
194+ "Since Python 3.8.0, external general entities are no longer processed by "
195+ "default since Python."
196+ msgstr ""
197+
198+ #: ../../library/xml.rst:87
189199msgid "billion laughs / exponential entity expansion"
190200msgstr ""
191201
192- #: ../../library/xml.rst:81
202+ #: ../../library/xml.rst:83
193203msgid ""
194204"The `Billion Laughs`_ attack -- also known as exponential entity expansion "
195205"-- uses multiple levels of nested entities. Each entity refers to another "
@@ -198,11 +208,11 @@ msgid ""
198208"consumes lots of memory and CPU time."
199209msgstr ""
200210
201- #: ../../library/xml.rst:92
211+ #: ../../library/xml.rst:94
202212msgid "quadratic blowup entity expansion"
203213msgstr ""
204214
205- #: ../../library/xml.rst:88
215+ #: ../../library/xml.rst:90
206216msgid ""
207217"A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it "
208218"abuses entity expansion, too. Instead of nested entities it repeats one "
@@ -211,39 +221,39 @@ msgid ""
211221"countermeasures that forbid deeply-nested entities."
212222msgstr ""
213223
214- #: ../../library/xml.rst:95
224+ #: ../../library/xml.rst:97
215225msgid ""
216226"Entity declarations can contain more than just text for replacement. They "
217227"can also point to external resources or local files. The XML parser accesses"
218228" the resource and embeds the content into the XML document."
219229msgstr ""
220230
221- #: ../../library/xml.rst:100
231+ #: ../../library/xml.rst:102
222232msgid ""
223233"Some XML libraries like Python's :mod:`xml.dom.pulldom` retrieve document "
224234"type definitions from remote or local locations. The feature has similar "
225235"implications as the external entity expansion issue."
226236msgstr ""
227237
228- #: ../../library/xml.rst:105
238+ #: ../../library/xml.rst:107
229239msgid ""
230240"Decompression bombs (aka `ZIP bomb`_) apply to all XML libraries that can "
231241"parse compressed XML streams such as gzipped HTTP streams or LZMA-compressed"
232242" files. For an attacker it can reduce the amount of transmitted data by "
233243"three magnitudes or more."
234244msgstr ""
235245
236- #: ../../library/xml.rst:111
246+ #: ../../library/xml.rst:113
237247msgid ""
238248"The documentation for `defusedxml`_ on PyPI has further information about "
239249"all known attack vectors with examples and references."
240250msgstr ""
241251
242- #: ../../library/xml.rst:117
252+ #: ../../library/xml.rst:119
243253msgid "The :mod:`defusedxml` and :mod:`defusedexpat` Packages"
244254msgstr ""
245255
246- #: ../../library/xml.rst:119
256+ #: ../../library/xml.rst:121
247257msgid ""
248258"`defusedxml`_ is a pure Python package with modified subclasses of all "
249259"stdlib XML parsers that prevent any potentially malicious operation. Use of "
@@ -252,7 +262,7 @@ msgid ""
252262"documentation on more XML exploits such as XPath injection."
253263msgstr ""
254264
255- #: ../../library/xml.rst:125
265+ #: ../../library/xml.rst:127
256266msgid ""
257267"`defusedexpat`_ provides a modified libexpat and a patched :mod:`pyexpat` "
258268"module that have countermeasures against entity expansion DoS attacks. The "
0 commit comments