Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit b62a8c3

Browse files
[po] auto sync
1 parent 6f37482 commit b62a8c3

2 files changed

Lines changed: 57 additions & 26 deletions

File tree

.stat.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
{"translation": "91.49%", "updated_at": "2024-02-23T14:22:50Z"}
1+
{"translation": "91.49%", "updated_at": "2024-02-23T22:22:57Z"}

library/xml.po

Lines changed: 56 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,22 @@
11
# SOME DESCRIPTIVE TITLE.
2-
# Copyright (C) 2001-2022, Python Software Foundation
2+
# Copyright (C) 2001-2024, Python Software Foundation
33
# This file is distributed under the same license as the Python package.
44
# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR.
55
#
66
# Translators:
77
# 汇民 王 <[email protected]>, 2019
8-
# Jian Aijun <jianaijun@gmail.com>, 2020
9-
# Freesand Leo <[email protected]>, 2022
8+
# Rafael Fontenelle <rffontenelle@gmail.com>, 2023
9+
# Freesand Leo <[email protected]>, 2024
1010
#
1111
#, fuzzy
1212
msgid ""
1313
msgstr ""
1414
"Project-Id-Version: Python 3.9\n"
1515
"Report-Msgid-Bugs-To: \n"
16-
"POT-Creation-Date: 2022-11-04 14:34+0000\n"
16+
"POT-Creation-Date: 2024-02-23 21:32+0000\n"
1717
"PO-Revision-Date: 2017-02-16 23:36+0000\n"
18-
"Last-Translator: Freesand Leo <[email protected]>, 2022\n"
19-
"Language-Team: Chinese (China) (https://www.transifex.com/python-doc/teams/5390/zh_CN/)\n"
18+
"Last-Translator: Freesand Leo <[email protected]>, 2024\n"
19+
"Language-Team: Chinese (China) (https://app.transifex.com/python-doc/teams/5390/zh_CN/)\n"
2020
"MIME-Version: 1.0\n"
2121
"Content-Type: text/plain; charset=UTF-8\n"
2222
"Content-Transfer-Encoding: 8bit\n"
@@ -52,7 +52,7 @@ msgid ""
5252
"is included with Python, so the :mod:`xml.parsers.expat` module will always "
5353
"be available."
5454
msgstr ""
55-
"值得注意的是 :mod:`xml` 包中的模块要求至少有一个 SAX 兼容的 XML 解析器可用。Expat 解析器包含在 Python ,因此 "
55+
"值得注意的是 :mod:`xml` 包中的模块要求至少有一个 SAX 兼容的 XML 解析器可用。Python 中包含 Expat 解析器,因此 "
5656
":mod:`xml.parsers.expat` 模块将始终可用。"
5757

5858
#: ../../library/xml.rst:30
@@ -149,7 +149,7 @@ msgstr "**易受攻击** (1)"
149149
msgid "quadratic blowup"
150150
msgstr "quadratic blowup"
151151

152-
#: ../../library/xml.rst:68 ../../library/xml.rst:103
152+
#: ../../library/xml.rst:68 ../../library/xml.rst:109
153153
msgid "external entity expansion"
154154
msgstr "external entity expansion"
155155

@@ -170,7 +170,7 @@ msgstr "安全 (3)"
170170
msgid "Safe (4)"
171171
msgstr "安全 (4)"
172172

173-
#: ../../library/xml.rst:69 ../../library/xml.rst:108
173+
#: ../../library/xml.rst:69 ../../library/xml.rst:114
174174
msgid "`DTD`_ retrieval"
175175
msgstr "`DTD`_ retrieval"
176176

@@ -180,15 +180,24 @@ msgstr "`DTD`_ retrieval"
180180
msgid "Safe"
181181
msgstr "安全"
182182

183-
#: ../../library/xml.rst:70 ../../library/xml.rst:115
183+
#: ../../library/xml.rst:70 ../../library/xml.rst:121
184184
msgid "decompression bomb"
185185
msgstr "decompression bomb"
186186

187187
#: ../../library/xml.rst:70
188188
msgid "**Vulnerable**"
189189
msgstr "**易受攻击**"
190190

191-
#: ../../library/xml.rst:73
191+
#: ../../library/xml.rst:71 ../../library/xml.rst:128
192+
msgid "large tokens"
193+
msgstr "解析大量词元"
194+
195+
#: ../../library/xml.rst:71 ../../library/xml.rst:71 ../../library/xml.rst:71
196+
#: ../../library/xml.rst:71 ../../library/xml.rst:71
197+
msgid "**Vulnerable** (6)"
198+
msgstr "**易受攻击** (6)"
199+
200+
#: ../../library/xml.rst:74
192201
msgid ""
193202
"Expat 2.4.1 and newer is not vulnerable to the \"billion laughs\" and "
194203
"\"quadratic blowup\" vulnerabilities. Items still listed as vulnerable due "
@@ -198,33 +207,43 @@ msgstr ""
198207
"Expat 2.4.1 及更新的版本不易受 \"billion laughs\"\"quadratic blowup\" 漏洞的攻击。 "
199208
"因为可能要依赖系统提供的库而仍被列为易受攻击的项目。 请检查 :data:`pyexpat.EXPAT_VERSION`。"
200209

201-
#: ../../library/xml.rst:77
210+
#: ../../library/xml.rst:78
202211
msgid ""
203212
":mod:`xml.etree.ElementTree` doesn't expand external entities and raises a "
204213
":exc:`ParserError` when an entity occurs."
205214
msgstr ":mod:`xml.etree.ElementTree` 不会扩展外部实体并在实体发生时引发 :exc:`ParserError`。"
206215

207-
#: ../../library/xml.rst:79
216+
#: ../../library/xml.rst:80
208217
msgid ""
209218
":mod:`xml.dom.minidom` doesn't expand external entities and simply returns "
210219
"the unexpanded entity verbatim."
211220
msgstr ":mod:`xml.dom.minidom` 不会扩展外部实体,只是简单地返回未扩展的实体。"
212221

213-
#: ../../library/xml.rst:81
222+
#: ../../library/xml.rst:82
214223
msgid ":mod:`xmlrpclib` doesn't expand external entities and omits them."
215224
msgstr ":mod:`xmlrpclib` 不扩展外部实体并省略它们。"
216225

217-
#: ../../library/xml.rst:82
226+
#: ../../library/xml.rst:83
218227
msgid ""
219228
"Since Python 3.7.1, external general entities are no longer processed by "
220229
"default."
221230
msgstr "从 Python 3.7.1 开始,默认情况下不再处理外部通用实体。"
222231

223-
#: ../../library/xml.rst:91
232+
#: ../../library/xml.rst:85
233+
msgid ""
234+
"Expat 2.6.0 and newer is not vulnerable to denial of service through "
235+
"quadratic runtime caused by parsing large tokens. Items still listed as "
236+
"vulnerable due to potential reliance on system-provided libraries. Check "
237+
":const:`!pyexpat.EXPAT_VERSION`."
238+
msgstr ""
239+
"Expat 2.6.0 及更新的版本不易受到因解析大量词元而导致利用指数级运行时间的拒绝服务攻击。 "
240+
"由于对系统所提供的库的潜在依赖仍会有一些项目被列为易受攻击。 请检查 :const:`!pyexpat.EXPAT_VERSION`。"
241+
242+
#: ../../library/xml.rst:97
224243
msgid "billion laughs / exponential entity expansion"
225244
msgstr "billion laughs / exponential entity expansion (狂笑/递归实体扩展)"
226245

227-
#: ../../library/xml.rst:87
246+
#: ../../library/xml.rst:93
228247
msgid ""
229248
"The `Billion Laughs`_ attack -- also known as exponential entity expansion "
230249
"-- uses multiple levels of nested entities. Each entity refers to another "
@@ -235,11 +254,11 @@ msgstr ""
235254
"`Billion Laughs`_ 攻击 -- 也称为递归实体扩展 -- 使用多级嵌套实体。 每个实体多次引用另一个实体,最终实体定义包含一个小字符串。"
236255
" 指数级扩展导致几千 GB 的文本,并消耗大量内存和 CPU 时间。"
237256

238-
#: ../../library/xml.rst:98
257+
#: ../../library/xml.rst:104
239258
msgid "quadratic blowup entity expansion"
240259
msgstr "quadratic blowup entity expansion(二次爆炸实体扩展)"
241260

242-
#: ../../library/xml.rst:94
261+
#: ../../library/xml.rst:100
243262
msgid ""
244263
"A quadratic blowup attack is similar to a `Billion Laughs`_ attack; it "
245264
"abuses entity expansion, too. Instead of nested entities it repeats one "
@@ -250,14 +269,14 @@ msgstr ""
250269
"二次爆炸攻击类似于 `Billion Laughs`_ 攻击,它也滥用实体扩展。 "
251270
"它不是嵌套实体,而是一遍又一遍地重复一个具有几千个字符的大型实体。攻击不如递归情况有效,但它避免触发禁止深度嵌套实体的解析器对策。"
252271

253-
#: ../../library/xml.rst:101
272+
#: ../../library/xml.rst:107
254273
msgid ""
255274
"Entity declarations can contain more than just text for replacement. They "
256275
"can also point to external resources or local files. The XML parser accesses"
257276
" the resource and embeds the content into the XML document."
258277
msgstr "实体声明可以包含的不仅仅是替换文本。 它们还可以指向外部资源或本地文件。 XML 解析器访问资源并将内容嵌入到 XML 文档中。"
259278

260-
#: ../../library/xml.rst:106
279+
#: ../../library/xml.rst:112
261280
msgid ""
262281
"Some XML libraries like Python's :mod:`xml.dom.pulldom` retrieve document "
263282
"type definitions from remote or local locations. The feature has similar "
@@ -266,7 +285,7 @@ msgstr ""
266285
"Python 的一些 XML 库 :mod:`xml.dom.pulldom` 从远程或本地位置检索文档类型定义。 "
267286
"该功能与外部实体扩展问题具有相似的含义。"
268287

269-
#: ../../library/xml.rst:111
288+
#: ../../library/xml.rst:117
270289
msgid ""
271290
"Decompression bombs (aka `ZIP bomb`_) apply to all XML libraries that can "
272291
"parse compressed XML streams such as gzipped HTTP streams or LZMA-compressed"
@@ -276,17 +295,29 @@ msgstr ""
276295
"Decompression bombs(解压炸弹,又名 `ZIP bomb`_)适用于所有可以解析压缩 XML 流(例如 gzip 压缩的 HTTP "
277296
"流或 LZMA 压缩的文件)的 XML 库。 对于攻击者来说,它可以将传输的数据量减少三个量级或更多。"
278297

279-
#: ../../library/xml.rst:117
298+
#: ../../library/xml.rst:124
299+
msgid ""
300+
"Expat needs to re-parse unfinished tokens; without the protection introduced"
301+
" in Expat 2.6.0, this can lead to quadratic runtime that can be used to "
302+
"cause denial of service in the application parsing XML. The issue is known "
303+
"as `CVE-2023-52425 <https://cve.mitre.org/cgi-"
304+
"bin/cvename.cgi?name=CVE-2023-52425>`_."
305+
msgstr ""
306+
"Expat 需要重新解析未完成的词元;在没有 Expat 2.6.0 所引入的防护措施的情况下,这会导致可被用来在解析 XML "
307+
"的应用程序中制造拒绝服务攻击的指数级运行时间。 此问题被称为 `CVE-2023-52425 <https://cve.mitre.org/cgi-"
308+
"bin/cvename.cgi?name=CVE-2023-52425>`_。"
309+
310+
#: ../../library/xml.rst:130
280311
msgid ""
281312
"The documentation for `defusedxml`_ on PyPI has further information about "
282313
"all known attack vectors with examples and references."
283314
msgstr "PyPI上 `defusedxml`_ 的文档包含有关所有已知攻击向量的更多信息以及示例和参考。"
284315

285-
#: ../../library/xml.rst:123
316+
#: ../../library/xml.rst:136
286317
msgid "The :mod:`defusedxml` Package"
287318
msgstr ":mod:`defusedxml` 包"
288319

289-
#: ../../library/xml.rst:125
320+
#: ../../library/xml.rst:138
290321
msgid ""
291322
"`defusedxml`_ is a pure Python package with modified subclasses of all "
292323
"stdlib XML parsers that prevent any potentially malicious operation. Use of "

0 commit comments

Comments
 (0)