11# SOME DESCRIPTIVE TITLE.
2- # Copyright (C) 2001-2022 , Python Software Foundation
2+ # Copyright (C) 2001-2024 , Python Software Foundation
33# This file is distributed under the same license as the Python package.
44# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
55#
66# Translators:
778- # Jian Aijun <jianaijun @gmail.com>, 2020
9- # Freesand Leo <[email protected] >, 2022 8+ # Rafael Fontenelle <rffontenelle @gmail.com>, 2023
9+ # Freesand Leo <[email protected] >, 2024 1010#
1111#, fuzzy
1212msgid ""
1313msgstr ""
1414"Project-Id-Version : Python 3.9\n "
1515"Report-Msgid-Bugs-To : \n "
16- "POT-Creation-Date : 2022-11-04 14:34 +0000\n "
16+ "POT-Creation-Date : 2024-02-23 21:32 +0000\n "
1717"PO-Revision-Date : 2017-02-16 23:36+0000\n "
18- "
Last-Translator :
Freesand Leo <[email protected] >, 2022 \n "
19- "Language-Team : Chinese (China) (https://www .transifex.com/python-doc/teams/5390/zh_CN/)\n "
18+ "
Last-Translator :
Freesand Leo <[email protected] >, 2024 \n "
19+ "Language-Team : Chinese (China) (https://app .transifex.com/python-doc/teams/5390/zh_CN/)\n "
2020"MIME-Version : 1.0\n "
2121"Content-Type : text/plain; charset=UTF-8\n "
2222"Content-Transfer-Encoding : 8bit\n "
@@ -52,7 +52,7 @@ msgid ""
5252"is included with Python, so the :mod:`xml.parsers.expat` module will always "
5353"be available."
5454msgstr ""
55- "值得注意的是 :mod:`xml` 包中的模块要求至少有一个 SAX 兼容的 XML 解析器可用。Expat 解析器包含在 Python 中 ,因此 "
55+ "值得注意的是 :mod:`xml` 包中的模块要求至少有一个 SAX 兼容的 XML 解析器可用。在 Python 中包含 Expat 解析器 ,因此 "
5656":mod:`xml.parsers.expat` 模块将始终可用。"
5757
5858#: ../../library/xml.rst:30
@@ -149,7 +149,7 @@ msgstr "**易受攻击** (1)"
149149msgid "quadratic blowup"
150150msgstr "quadratic blowup"
151151
152- #: ../../library/xml.rst:68 ../../library/xml.rst:103
152+ #: ../../library/xml.rst:68 ../../library/xml.rst:109
153153msgid "external entity expansion"
154154msgstr "external entity expansion"
155155
@@ -170,7 +170,7 @@ msgstr "安全 (3)"
170170msgid "Safe (4)"
171171msgstr "安全 (4)"
172172
173- #: ../../library/xml.rst:69 ../../library/xml.rst:108
173+ #: ../../library/xml.rst:69 ../../library/xml.rst:114
174174msgid "`DTD`_ retrieval"
175175msgstr "`DTD`_ retrieval"
176176
@@ -180,15 +180,24 @@ msgstr "`DTD`_ retrieval"
180180msgid "Safe"
181181msgstr "安全"
182182
183- #: ../../library/xml.rst:70 ../../library/xml.rst:115
183+ #: ../../library/xml.rst:70 ../../library/xml.rst:121
184184msgid "decompression bomb"
185185msgstr "decompression bomb"
186186
187187#: ../../library/xml.rst:70
188188msgid "**Vulnerable**"
189189msgstr "**易受攻击**"
190190
191- #: ../../library/xml.rst:73
191+ #: ../../library/xml.rst:71 ../../library/xml.rst:128
192+ msgid "large tokens"
193+ msgstr "解析大量词元"
194+
195+ #: ../../library/xml.rst:71 ../../library/xml.rst:71 ../../library/xml.rst:71
196+ #: ../../library/xml.rst:71 ../../library/xml.rst:71
197+ msgid "**Vulnerable** (6)"
198+ msgstr "**易受攻击** (6)"
199+
200+ #: ../../library/xml.rst:74
192201msgid ""
193202"Expat 2.4.1 and newer is not vulnerable to the \" billion laughs\" and "
194203"\" quadratic blowup\" vulnerabilities. Items still listed as vulnerable due "
@@ -198,33 +207,43 @@ msgstr ""
198207"Expat 2.4.1 及更新的版本不易受 \" billion laughs\" 和 \" quadratic blowup\" 漏洞的攻击。 "
199208"因为可能要依赖系统提供的库而仍被列为易受攻击的项目。 请检查 :data:`pyexpat.EXPAT_VERSION`。"
200209
201- #: ../../library/xml.rst:77
210+ #: ../../library/xml.rst:78
202211msgid ""
203212":mod:`xml.etree.ElementTree` doesn't expand external entities and raises a "
204213":exc:`ParserError` when an entity occurs."
205214msgstr ":mod:`xml.etree.ElementTree` 不会扩展外部实体并在实体发生时引发 :exc:`ParserError`。"
206215
207- #: ../../library/xml.rst:79
216+ #: ../../library/xml.rst:80
208217msgid ""
209218":mod:`xml.dom.minidom` doesn't expand external entities and simply returns "
210219"the unexpanded entity verbatim."
211220msgstr ":mod:`xml.dom.minidom` 不会扩展外部实体,只是简单地返回未扩展的实体。"
212221
213- #: ../../library/xml.rst:81
222+ #: ../../library/xml.rst:82
214223msgid ":mod:`xmlrpclib` doesn't expand external entities and omits them."
215224msgstr ":mod:`xmlrpclib` 不扩展外部实体并省略它们。"
216225
217- #: ../../library/xml.rst:82
226+ #: ../../library/xml.rst:83
218227msgid ""
219228"Since Python 3.7.1, external general entities are no longer processed by "
220229"default."
221230msgstr "从 Python 3.7.1 开始,默认情况下不再处理外部通用实体。"
222231
223- #: ../../library/xml.rst:91
232+ #: ../../library/xml.rst:85
233+ msgid ""
234+ "Expat 2.6.0 and newer is not vulnerable to denial of service through "
235+ "quadratic runtime caused by parsing large tokens. Items still listed as "
236+ "vulnerable due to potential reliance on system-provided libraries. Check "
237+ ":const:`!pyexpat.EXPAT_VERSION`."
238+ msgstr ""
239+ "Expat 2.6.0 及更新的版本不易受到因解析大量词元而导致利用指数级运行时间的拒绝服务攻击。 "
240+ "由于对系统所提供的库的潜在依赖仍会有一些项目被列为易受攻击。 请检查 :const:`!pyexpat.EXPAT_VERSION`。"
241+
242+ #: ../../library/xml.rst:97
224243msgid "billion laughs / exponential entity expansion"
225244msgstr "billion laughs / exponential entity expansion (狂笑/递归实体扩展)"
226245
227- #: ../../library/xml.rst:87
246+ #: ../../library/xml.rst:93
228247msgid ""
229248"The `Billion Laughs`_ attack -- also known as exponential entity expansion "
230249"-- uses multiple levels of nested entities. Each entity refers to another "
@@ -235,11 +254,11 @@ msgstr ""
235254"`Billion Laughs`_ 攻击 -- 也称为递归实体扩展 -- 使用多级嵌套实体。 每个实体多次引用另一个实体,最终实体定义包含一个小字符串。"
236255" 指数级扩展导致几千 GB 的文本,并消耗大量内存和 CPU 时间。"
237256
238- #: ../../library/xml.rst:98
257+ #: ../../library/xml.rst:104
239258msgid "quadratic blowup entity expansion"
240259msgstr "quadratic blowup entity expansion(二次爆炸实体扩展)"
241260
242- #: ../../library/xml.rst:94
261+ #: ../../library/xml.rst:100
243262msgid ""
244263"A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it "
245264"abuses entity expansion, too. Instead of nested entities it repeats one "
@@ -250,14 +269,14 @@ msgstr ""
250269"二次爆炸攻击类似于 `Billion Laughs`_ 攻击,它也滥用实体扩展。 "
251270"它不是嵌套实体,而是一遍又一遍地重复一个具有几千个字符的大型实体。攻击不如递归情况有效,但它避免触发禁止深度嵌套实体的解析器对策。"
252271
253- #: ../../library/xml.rst:101
272+ #: ../../library/xml.rst:107
254273msgid ""
255274"Entity declarations can contain more than just text for replacement. They "
256275"can also point to external resources or local files. The XML parser accesses"
257276" the resource and embeds the content into the XML document."
258277msgstr "实体声明可以包含的不仅仅是替换文本。 它们还可以指向外部资源或本地文件。 XML 解析器访问资源并将内容嵌入到 XML 文档中。"
259278
260- #: ../../library/xml.rst:106
279+ #: ../../library/xml.rst:112
261280msgid ""
262281"Some XML libraries like Python's :mod:`xml.dom.pulldom` retrieve document "
263282"type definitions from remote or local locations. The feature has similar "
@@ -266,7 +285,7 @@ msgstr ""
266285"Python 的一些 XML 库 :mod:`xml.dom.pulldom` 从远程或本地位置检索文档类型定义。 "
267286"该功能与外部实体扩展问题具有相似的含义。"
268287
269- #: ../../library/xml.rst:111
288+ #: ../../library/xml.rst:117
270289msgid ""
271290"Decompression bombs (aka `ZIP bomb`_) apply to all XML libraries that can "
272291"parse compressed XML streams such as gzipped HTTP streams or LZMA-compressed"
@@ -276,17 +295,29 @@ msgstr ""
276295"Decompression bombs(解压炸弹,又名 `ZIP bomb`_)适用于所有可以解析压缩 XML 流(例如 gzip 压缩的 HTTP "
277296"流或 LZMA 压缩的文件)的 XML 库。 对于攻击者来说,它可以将传输的数据量减少三个量级或更多。"
278297
279- #: ../../library/xml.rst:117
298+ #: ../../library/xml.rst:124
299+ msgid ""
300+ "Expat needs to re-parse unfinished tokens; without the protection introduced"
301+ " in Expat 2.6.0, this can lead to quadratic runtime that can be used to "
302+ "cause denial of service in the application parsing XML. The issue is known "
303+ "as `CVE-2023-52425 <https://cve.mitre.org/cgi-"
304+ "bin/cvename.cgi?name=CVE-2023-52425>`_."
305+ msgstr ""
306+ "Expat 需要重新解析未完成的词元;在没有 Expat 2.6.0 所引入的防护措施的情况下,这会导致可被用来在解析 XML "
307+ "的应用程序中制造拒绝服务攻击的指数级运行时间。 此问题被称为 `CVE-2023-52425 <https://cve.mitre.org/cgi-"
308+ "bin/cvename.cgi?name=CVE-2023-52425>`_。"
309+
310+ #: ../../library/xml.rst:130
280311msgid ""
281312"The documentation for `defusedxml`_ on PyPI has further information about "
282313"all known attack vectors with examples and references."
283314msgstr "PyPI上 `defusedxml`_ 的文档包含有关所有已知攻击向量的更多信息以及示例和参考。"
284315
285- #: ../../library/xml.rst:123
316+ #: ../../library/xml.rst:136
286317msgid "The :mod:`defusedxml` Package"
287318msgstr ":mod:`defusedxml` 包"
288319
289- #: ../../library/xml.rst:125
320+ #: ../../library/xml.rst:138
290321msgid ""
291322"`defusedxml`_ is a pure Python package with modified subclasses of all "
292323"stdlib XML parsers that prevent any potentially malicious operation. Use of "
0 commit comments