@@ -11,7 +11,7 @@ msgid ""
1111msgstr ""
1212"Project-Id-Version : Python 3.14\n "
1313"Report-Msgid-Bugs-To : \n "
14- "POT-Creation-Date : 2026-03-25 14:54 +0000\n "
14+ "POT-Creation-Date : 2026-04-03 14:38 +0000\n "
1515"PO-Revision-Date : 2025-09-16 00:00+0000\n "
1616"Last-Translator : python-doc bot, 2025\n "
1717"Language-Team : Japanese (https://app.transifex.com/python-doc/teams/5390/ "
@@ -997,3 +997,90 @@ msgid ""
997997"Resume the process (if suspended). The script will execute at the next safe "
998998"evaluation point."
999999msgstr ""
1000+
1001+ #: ../../howto/remote_debugging.rst:631
1002+ msgid "Security and threat model"
1003+ msgstr ""
1004+
1005+ #: ../../howto/remote_debugging.rst:633
1006+ msgid ""
1007+ "The remote debugging protocol relies on the same operating system primitives "
1008+ "used by native debuggers such as GDB and LLDB. Attaching to a process "
1009+ "requires the **same privileges** that those debuggers require, for example "
1010+ "``ptrace`` / Yama LSM on Linux, ``task_for_pid`` on macOS, and "
1011+ "``SeDebugPrivilege`` on Windows. Python does not introduce any new "
1012+ "privilege escalation path; if an attacker already possesses the permissions "
1013+ "needed to attach to a process, they could equally use GDB to read memory or "
1014+ "inject code."
1015+ msgstr ""
1016+
1017+ #: ../../howto/remote_debugging.rst:642
1018+ msgid ""
1019+ "The following principles define what is, and is not, considered a security "
1020+ "vulnerability in this feature:"
1021+ msgstr ""
1022+
1023+ #: ../../howto/remote_debugging.rst:645
1024+ msgid "Attaching requires OS-level privileges"
1025+ msgstr ""
1026+
1027+ #: ../../howto/remote_debugging.rst:646
1028+ msgid ""
1029+ "On every supported platform the operating system gates cross-process memory "
1030+ "access behind privilege checks (``CAP_SYS_PTRACE``, root, or administrator "
1031+ "rights). A report that demonstrates an issue only after these privileges "
1032+ "have already been obtained is **not** a vulnerability in CPython, since the "
1033+ "OS security boundary was already crossed."
1034+ msgstr ""
1035+
1036+ #: ../../howto/remote_debugging.rst:652
1037+ msgid ""
1038+ "Crashes or memory errors when reading a compromised process are not "
1039+ "vulnerabilities"
1040+ msgstr ""
1041+
1042+ #: ../../howto/remote_debugging.rst:653
1043+ msgid ""
1044+ "A tool that reads internal interpreter state from a target process must "
1045+ "trust that memory to be well-formed. If the target process has been "
1046+ "corrupted or is controlled by an attacker, the debugger or profiler may "
1047+ "crash, produce garbage output, or behave unpredictably. This is the same "
1048+ "risk accepted by every ``ptrace``-based debugger. Bugs in this category "
1049+ "(buffer overflows, segmentation faults, or undefined behaviour triggered by "
1050+ "reading corrupted state) are **not** treated as security issues, though "
1051+ "fixes that improve robustness are welcome."
1052+ msgstr ""
1053+
1054+ #: ../../howto/remote_debugging.rst:662
1055+ msgid "Vulnerabilities in the target process are not in scope"
1056+ msgstr ""
1057+
1058+ #: ../../howto/remote_debugging.rst:663
1059+ msgid ""
1060+ "If the Python process being debugged has already been compromised, the "
1061+ "attacker already controls execution in that process. Demonstrating further "
1062+ "impact from that starting point does not constitute a vulnerability in the "
1063+ "remote debugging protocol."
1064+ msgstr ""
1065+
1066+ #: ../../howto/remote_debugging.rst:669
1067+ msgid "When to use ``PYTHON_DISABLE_REMOTE_DEBUG``"
1068+ msgstr ""
1069+
1070+ #: ../../howto/remote_debugging.rst:671
1071+ msgid ""
1072+ "The environment variable :envvar:`PYTHON_DISABLE_REMOTE_DEBUG` (and the "
1073+ "equivalent :option:`-X disable_remote_debug` flag) allows operators to "
1074+ "disable the in-process side of the protocol as a **defence-in-depth** "
1075+ "measure. This may be useful in hardened or sandboxed deployment "
1076+ "environments where no debugging or profiling of the process is expected and "
1077+ "reducing attack surface is a priority, even though the OS-level privilege "
1078+ "checks already prevent unprivileged access."
1079+ msgstr ""
1080+
1081+ #: ../../howto/remote_debugging.rst:679
1082+ msgid ""
1083+ "Setting this variable does **not** affect other OS-level debugging "
1084+ "interfaces (``ptrace``, ``/proc``, ``task_for_pid``, etc.), which remain "
1085+ "available according to their own permission models."
1086+ msgstr ""
0 commit comments