Skip to content

Commit c467400

Browse files
author
github-actions
committed
Update translations from Transifex
1 parent 4127805 commit c467400

File tree

4 files changed

+868
-766
lines changed

4 files changed

+868
-766
lines changed

howto/remote_debugging.po

Lines changed: 88 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ msgid ""
1111
msgstr ""
1212
"Project-Id-Version: Python 3.14\n"
1313
"Report-Msgid-Bugs-To: \n"
14-
"POT-Creation-Date: 2026-03-25 14:54+0000\n"
14+
"POT-Creation-Date: 2026-04-03 14:38+0000\n"
1515
"PO-Revision-Date: 2025-09-16 00:00+0000\n"
1616
"Last-Translator: python-doc bot, 2025\n"
1717
"Language-Team: Japanese (https://app.transifex.com/python-doc/teams/5390/"
@@ -997,3 +997,90 @@ msgid ""
997997
"Resume the process (if suspended). The script will execute at the next safe "
998998
"evaluation point."
999999
msgstr ""
1000+
1001+
#: ../../howto/remote_debugging.rst:631
1002+
msgid "Security and threat model"
1003+
msgstr ""
1004+
1005+
#: ../../howto/remote_debugging.rst:633
1006+
msgid ""
1007+
"The remote debugging protocol relies on the same operating system primitives "
1008+
"used by native debuggers such as GDB and LLDB. Attaching to a process "
1009+
"requires the **same privileges** that those debuggers require, for example "
1010+
"``ptrace`` / Yama LSM on Linux, ``task_for_pid`` on macOS, and "
1011+
"``SeDebugPrivilege`` on Windows. Python does not introduce any new "
1012+
"privilege escalation path; if an attacker already possesses the permissions "
1013+
"needed to attach to a process, they could equally use GDB to read memory or "
1014+
"inject code."
1015+
msgstr ""
1016+
1017+
#: ../../howto/remote_debugging.rst:642
1018+
msgid ""
1019+
"The following principles define what is, and is not, considered a security "
1020+
"vulnerability in this feature:"
1021+
msgstr ""
1022+
1023+
#: ../../howto/remote_debugging.rst:645
1024+
msgid "Attaching requires OS-level privileges"
1025+
msgstr ""
1026+
1027+
#: ../../howto/remote_debugging.rst:646
1028+
msgid ""
1029+
"On every supported platform the operating system gates cross-process memory "
1030+
"access behind privilege checks (``CAP_SYS_PTRACE``, root, or administrator "
1031+
"rights). A report that demonstrates an issue only after these privileges "
1032+
"have already been obtained is **not** a vulnerability in CPython, since the "
1033+
"OS security boundary was already crossed."
1034+
msgstr ""
1035+
1036+
#: ../../howto/remote_debugging.rst:652
1037+
msgid ""
1038+
"Crashes or memory errors when reading a compromised process are not "
1039+
"vulnerabilities"
1040+
msgstr ""
1041+
1042+
#: ../../howto/remote_debugging.rst:653
1043+
msgid ""
1044+
"A tool that reads internal interpreter state from a target process must "
1045+
"trust that memory to be well-formed. If the target process has been "
1046+
"corrupted or is controlled by an attacker, the debugger or profiler may "
1047+
"crash, produce garbage output, or behave unpredictably. This is the same "
1048+
"risk accepted by every ``ptrace``-based debugger. Bugs in this category "
1049+
"(buffer overflows, segmentation faults, or undefined behaviour triggered by "
1050+
"reading corrupted state) are **not** treated as security issues, though "
1051+
"fixes that improve robustness are welcome."
1052+
msgstr ""
1053+
1054+
#: ../../howto/remote_debugging.rst:662
1055+
msgid "Vulnerabilities in the target process are not in scope"
1056+
msgstr ""
1057+
1058+
#: ../../howto/remote_debugging.rst:663
1059+
msgid ""
1060+
"If the Python process being debugged has already been compromised, the "
1061+
"attacker already controls execution in that process. Demonstrating further "
1062+
"impact from that starting point does not constitute a vulnerability in the "
1063+
"remote debugging protocol."
1064+
msgstr ""
1065+
1066+
#: ../../howto/remote_debugging.rst:669
1067+
msgid "When to use ``PYTHON_DISABLE_REMOTE_DEBUG``"
1068+
msgstr ""
1069+
1070+
#: ../../howto/remote_debugging.rst:671
1071+
msgid ""
1072+
"The environment variable :envvar:`PYTHON_DISABLE_REMOTE_DEBUG` (and the "
1073+
"equivalent :option:`-X disable_remote_debug` flag) allows operators to "
1074+
"disable the in-process side of the protocol as a **defence-in-depth** "
1075+
"measure. This may be useful in hardened or sandboxed deployment "
1076+
"environments where no debugging or profiling of the process is expected and "
1077+
"reducing attack surface is a priority, even though the OS-level privilege "
1078+
"checks already prevent unprivileged access."
1079+
msgstr ""
1080+
1081+
#: ../../howto/remote_debugging.rst:679
1082+
msgid ""
1083+
"Setting this variable does **not** affect other OS-level debugging "
1084+
"interfaces (``ptrace``, ``/proc``, ``task_for_pid``, etc.), which remain "
1085+
"available according to their own permission models."
1086+
msgstr ""

0 commit comments

Comments
 (0)