1- # SOME DESCRIPTIVE TITLE.
2- # Copyright (C) 2001-2022, Python Software Foundation
1+ # Copyright (C) 2001-2023, Python Software Foundation
32# This file is distributed under the same license as the Python package.
43#
54# Translators:
65# Leon H., 2017
6+ # Matt Wang <[email protected] >, 202377msgid ""
88msgstr ""
99"Project-Id-Version : Python 3.12\n "
1010"Report-Msgid-Bugs-To : \n "
1111"POT-Creation-Date : 2023-07-29 10:36+0000\n "
12- "PO-Revision-Date : 2018-05-23 16 :16+0000\n "
13- "Last-Translator : Adrian Liaw <adrianliaw2000 @gmail.com>\n "
12+ "PO-Revision-Date : 2023-08-21 02 :16+0000\n "
13+ "Last-Translator : Matt Wang <mattwang44 @gmail.com>\n "
1414"Language-Team : Chinese - TAIWAN (https://github.com/python/python-docs-zh- "
1515"tw)\n "
1616"Language : zh_TW\n "
@@ -30,14 +30,16 @@ msgstr "**原始碼:**\\ :source:`Lib/xml/`"
3030#: ../../library/xml.rst:16
3131msgid ""
3232"Python's interfaces for processing XML are grouped in the ``xml`` package."
33- msgstr ""
33+ msgstr "Python 處理 XML 的介面被歸類於 ``xml`` 套件中。 "
3434
3535#: ../../library/xml.rst:20
3636msgid ""
3737"The XML modules are not secure against erroneous or maliciously constructed "
3838"data. If you need to parse untrusted or unauthenticated data see the :ref:"
3939"`xml-vulnerabilities` and :ref:`defusedxml-package` sections."
4040msgstr ""
41+ "XML 模組無法抵禦錯誤或惡意建構的資料。如果你需要剖析不受信任或未經身份驗證的"
42+ "資料,請參閱 :ref:`xml-vulnerabilities` 和 :ref:`defusedxml-package` 段落。"
4143
4244#: ../../library/xml.rst:25
4345msgid ""
@@ -46,46 +48,52 @@ msgid ""
4648"is included with Python, so the :mod:`xml.parsers.expat` module will always "
4749"be available."
4850msgstr ""
51+ "請務必注意 :mod:`xml` 套件中的模組要求至少有一個可用的 SAX 相容 XML 剖析器。"
52+ "Expat 剖析器包含在 Python 中,所以總是可以使用 :mod:`xml.parsers.expat` 模"
53+ "組。"
4954
5055#: ../../library/xml.rst:30
5156msgid ""
5257"The documentation for the :mod:`xml.dom` and :mod:`xml.sax` packages are the "
5358"definition of the Python bindings for the DOM and SAX interfaces."
5459msgstr ""
60+ ":mod:`xml.dom` 和 :mod:`xml.sax` 套件的文件為 DOM 和 SAX 介面的 Python 繫結的"
61+ "定義。"
5562
5663#: ../../library/xml.rst:33
5764msgid "The XML handling submodules are:"
58- msgstr ""
65+ msgstr "以下是 XML 處理子模組: "
5966
6067#: ../../library/xml.rst:35
6168msgid ""
6269":mod:`xml.etree.ElementTree`: the ElementTree API, a simple and lightweight "
6370"XML processor"
6471msgstr ""
72+ ":mod:`xml.etree.ElementTree`:ElementTree API,一個簡單且輕量級的 XML 處理器"
6573
6674#: ../../library/xml.rst:40
6775msgid ":mod:`xml.dom`: the DOM API definition"
68- msgstr ""
76+ msgstr ":mod:`xml.dom`:DOM API 定義 "
6977
7078#: ../../library/xml.rst:41
7179msgid ":mod:`xml.dom.minidom`: a minimal DOM implementation"
72- msgstr ""
80+ msgstr ":mod:`xml.dom.minidom`:最小的 DOM 實作 "
7381
7482#: ../../library/xml.rst:42
7583msgid ":mod:`xml.dom.pulldom`: support for building partial DOM trees"
76- msgstr ""
84+ msgstr ":mod:`xml.dom.pulldom`:支援建置部分 DOM 樹 "
7785
7886#: ../../library/xml.rst:46
7987msgid ":mod:`xml.sax`: SAX2 base classes and convenience functions"
80- msgstr ""
88+ msgstr ":mod:`xml.sax`:SAX2 基底類別和便利函式 "
8189
8290#: ../../library/xml.rst:47
8391msgid ":mod:`xml.parsers.expat`: the Expat parser binding"
84- msgstr ""
92+ msgstr ":mod:`xml.parsers.expat`:Expat 剖析器繫結 "
8593
8694#: ../../library/xml.rst:53
8795msgid "XML vulnerabilities"
88- msgstr ""
96+ msgstr "XML 漏洞 "
8997
9098#: ../../library/xml.rst:55
9199msgid ""
@@ -94,16 +102,19 @@ msgid ""
94102"attacks, access local files, generate network connections to other machines, "
95103"or circumvent firewalls."
96104msgstr ""
105+ "XML 處理模組無法抵禦惡意建構的資料。攻擊者可以濫用 XML 功能來執行阻斷服務攻"
106+ "擊 (denial of service attack)、存取本地檔案、生成與其他機器的網路連接或繞過防"
107+ "火牆。"
97108
98109#: ../../library/xml.rst:60
99110msgid ""
100111"The following table gives an overview of the known attacks and whether the "
101112"various modules are vulnerable to them."
102- msgstr ""
113+ msgstr "下表概述了已知的攻擊以及各個模組是否易有漏洞。 "
103114
104115#: ../../library/xml.rst:64
105116msgid "kind"
106- msgstr ""
117+ msgstr "種類 "
107118
108119#: ../../library/xml.rst:64
109120msgid "sax"
@@ -127,51 +138,51 @@ msgstr "xmlrpc"
127138
128139#: ../../library/xml.rst:66
129140msgid "billion laughs"
130- msgstr ""
141+ msgstr "十億笑聲 (billion laughs) "
131142
132143#: ../../library/xml.rst:66 ../../library/xml.rst:67
133144msgid "**Vulnerable** (1)"
134- msgstr ""
145+ msgstr "**脆弱** (1) "
135146
136147#: ../../library/xml.rst:67
137148msgid "quadratic blowup"
138- msgstr ""
149+ msgstr "二次爆炸 (quadratic blowup) "
139150
140151#: ../../library/xml.rst:68 ../../library/xml.rst:103
141152msgid "external entity expansion"
142- msgstr ""
153+ msgstr "外部實體擴展 (external entity expansion) "
143154
144155#: ../../library/xml.rst:68 ../../library/xml.rst:69
145156msgid "Safe (5)"
146- msgstr ""
157+ msgstr "安全 (5) "
147158
148159#: ../../library/xml.rst:68
149160msgid "Safe (2)"
150- msgstr ""
161+ msgstr "安全 (2) "
151162
152163#: ../../library/xml.rst:68
153164msgid "Safe (3)"
154- msgstr ""
165+ msgstr "安全 (3) "
155166
156167#: ../../library/xml.rst:68
157168msgid "Safe (4)"
158- msgstr ""
169+ msgstr "安全 (4) "
159170
160171#: ../../library/xml.rst:69 ../../library/xml.rst:108
161172msgid "`DTD`_ retrieval"
162- msgstr ""
173+ msgstr "`DTD`_ 檢索 "
163174
164175#: ../../library/xml.rst:69 ../../library/xml.rst:70
165176msgid "Safe"
166- msgstr ""
177+ msgstr "安全 "
167178
168179#: ../../library/xml.rst:70 ../../library/xml.rst:115
169180msgid "decompression bomb"
170- msgstr ""
181+ msgstr "解壓縮炸彈 (decompression bomb) "
171182
172183#: ../../library/xml.rst:70
173184msgid "**Vulnerable**"
174- msgstr ""
185+ msgstr "**脆弱** "
175186
176187#: ../../library/xml.rst:73
177188msgid ""
@@ -180,32 +191,37 @@ msgid ""
180191"to potential reliance on system-provided libraries. Check :const:`pyexpat."
181192"EXPAT_VERSION`."
182193msgstr ""
194+ "Expat 2.4.1 及更新的版本不易受到「十億笑聲」和「二次爆炸」漏洞的影響。但仍可"
195+ "能由於依賴系統提供的函式庫而被列為易受攻擊的項目。請檢查 :const:`pyexpat."
196+ "EXPAT_VERSION`。"
183197
184198#: ../../library/xml.rst:77
185199msgid ""
186200":mod:`xml.etree.ElementTree` doesn't expand external entities and raises a :"
187201"exc:`~xml.etree.ElementTree.ParseError` when an entity occurs."
188202msgstr ""
203+ ":mod:`xml.etree.ElementTree` 不會擴展外部實體,並在實體出現時引發 :exc:`~xml."
204+ "etree.ElementTree.ParseError`。"
189205
190206#: ../../library/xml.rst:79
191207msgid ""
192208":mod:`xml.dom.minidom` doesn't expand external entities and simply returns "
193209"the unexpanded entity verbatim."
194- msgstr ""
210+ msgstr ":mod:`xml.dom.minidom` 不會擴展外部實體,只會逐字回傳未擴展的實體。 "
195211
196212#: ../../library/xml.rst:81
197213msgid ":mod:`xmlrpc.client` doesn't expand external entities and omits them."
198- msgstr ""
214+ msgstr ":mod:`xmlrpc.client` 不會擴展外部實體且會忽略它們。 "
199215
200216#: ../../library/xml.rst:82
201217msgid ""
202218"Since Python 3.7.1, external general entities are no longer processed by "
203219"default."
204- msgstr ""
220+ msgstr "從 Python 3.7.1 開始,預設情況下不再處理外部通用實體。 "
205221
206222#: ../../library/xml.rst:91
207223msgid "billion laughs / exponential entity expansion"
208- msgstr ""
224+ msgstr "十億笑聲 / 指數實體擴展 "
209225
210226#: ../../library/xml.rst:87
211227msgid ""
@@ -215,10 +231,13 @@ msgid ""
215231"string. The exponential expansion results in several gigabytes of text and "
216232"consumes lots of memory and CPU time."
217233msgstr ""
234+ "`十億笑聲 <Billion Laughs_>`_\\ 攻擊(也稱為指數實體擴展 (exponential entity "
235+ "expansion))使用多層巢狀實體。每個實體多次引用另一個實體,最終的實體定義包含"
236+ "一個小字串。指數擴展會產生數 GB 的文本,並消耗大量記憶體和 CPU 時間。"
218237
219238#: ../../library/xml.rst:98
220239msgid "quadratic blowup entity expansion"
221- msgstr ""
240+ msgstr "二次爆炸實體擴展 "
222241
223242#: ../../library/xml.rst:94
224243msgid ""
@@ -228,20 +247,27 @@ msgid ""
228247"isn't as efficient as the exponential case but it avoids triggering parser "
229248"countermeasures that forbid deeply nested entities."
230249msgstr ""
250+ "二次爆炸攻擊類似於\\ `十億笑聲 <Billion Laughs_>`_\\ 攻擊;它也濫用實體擴展。"
251+ "它不是巢狀實體,而是一遍又一遍地重複一個具有幾千個字元的大型實體。該攻擊不如"
252+ "指數擴展那麼有效率,但它不會觸發那些用來防止深度巢狀實體的剖析器對策。"
231253
232254#: ../../library/xml.rst:101
233255msgid ""
234256"Entity declarations can contain more than just text for replacement. They "
235257"can also point to external resources or local files. The XML parser accesses "
236258"the resource and embeds the content into the XML document."
237259msgstr ""
260+ "實體聲明不僅僅可以包含用於替換的文本,它們還可以指向外部資源或本地檔案。XML "
261+ "剖析器會存取資源並將內容嵌入到 XML 文件中。"
238262
239263#: ../../library/xml.rst:106
240264msgid ""
241265"Some XML libraries like Python's :mod:`xml.dom.pulldom` retrieve document "
242266"type definitions from remote or local locations. The feature has similar "
243267"implications as the external entity expansion issue."
244268msgstr ""
269+ "一些 XML 函式庫(例如 Python 的 :mod:`xml.dom.pulldom`)從遠端或本地位置檢索"
270+ "文件類型定義。該功能與外部實體擴展問題具有類似的含義。"
245271
246272#: ../../library/xml.rst:111
247273msgid ""
@@ -250,12 +276,17 @@ msgid ""
250276"files. For an attacker it can reduce the amount of transmitted data by three "
251277"magnitudes or more."
252278msgstr ""
279+ "解壓縮炸彈(又名 `ZIP bomb`_\\ )適用於所有可以剖析壓縮 XML 串流(例如 gzip "
280+ "壓縮的 HTTP 串流或 LZMA 壓縮檔案)的 XML 函式庫。對於攻擊者來說,它可以將傳輸"
281+ "的資料量減少三個或更多數量級。"
253282
254283#: ../../library/xml.rst:117
255284msgid ""
256285"The documentation for `defusedxml`_ on PyPI has further information about "
257286"all known attack vectors with examples and references."
258287msgstr ""
288+ "PyPI 上的 `defusedxml`_ 文件包含有關所有已知攻擊媒介 (attack vector) 的更多資"
289+ "訊以及範例和參考資料。"
259290
260291#: ../../library/xml.rst:123
261292msgid "The :mod:`!defusedxml` Package"
@@ -269,3 +300,7 @@ msgid ""
269300"data. The package also ships with example exploits and extended "
270301"documentation on more XML exploits such as XPath injection."
271302msgstr ""
303+ "`defusedxml`_ 是一個純 Python 套件,其中包含所有標準函式庫中 XML 剖析器的修正"
304+ "版本子類別,可防止任何潛在的惡意操作。當伺服器程式會剖析任何不受信任的 XML 資"
305+ "料時建議使用此套件。該套件還附帶了更多有關 XML 漏洞(例如 XPath 注入)的範例"
306+ "和延伸文件。"
0 commit comments