@@ -12,7 +12,7 @@ msgid ""
1212msgstr ""
1313"Project-Id-Version : Python 3.14\n "
1414"Report-Msgid-Bugs-To : \n "
15- "POT-Creation-Date : 2026-01-23 14:20 +0000\n "
15+ "POT-Creation-Date : 2026-04-03 14:38 +0000\n "
1616"PO-Revision-Date : 2025-09-16 00:00+0000\n "
1717"Last-Translator : Rafael Fontenelle <rffontenelle@gmail.com>, 2025\n "
1818"Language-Team : Portuguese (Brazil) (https://app.transifex.com/python-doc/ "
@@ -1467,3 +1467,90 @@ msgid ""
14671467msgstr ""
14681468"Retoma o processo (se suspenso). O script será executado no próximo ponto de "
14691469"avaliação seguro."
1470+
1471+ #: ../../howto/remote_debugging.rst:631
1472+ msgid "Security and threat model"
1473+ msgstr ""
1474+
1475+ #: ../../howto/remote_debugging.rst:633
1476+ msgid ""
1477+ "The remote debugging protocol relies on the same operating system primitives "
1478+ "used by native debuggers such as GDB and LLDB. Attaching to a process "
1479+ "requires the **same privileges** that those debuggers require, for example "
1480+ "``ptrace`` / Yama LSM on Linux, ``task_for_pid`` on macOS, and "
1481+ "``SeDebugPrivilege`` on Windows. Python does not introduce any new "
1482+ "privilege escalation path; if an attacker already possesses the permissions "
1483+ "needed to attach to a process, they could equally use GDB to read memory or "
1484+ "inject code."
1485+ msgstr ""
1486+
1487+ #: ../../howto/remote_debugging.rst:642
1488+ msgid ""
1489+ "The following principles define what is, and is not, considered a security "
1490+ "vulnerability in this feature:"
1491+ msgstr ""
1492+
1493+ #: ../../howto/remote_debugging.rst:645
1494+ msgid "Attaching requires OS-level privileges"
1495+ msgstr ""
1496+
1497+ #: ../../howto/remote_debugging.rst:646
1498+ msgid ""
1499+ "On every supported platform the operating system gates cross-process memory "
1500+ "access behind privilege checks (``CAP_SYS_PTRACE``, root, or administrator "
1501+ "rights). A report that demonstrates an issue only after these privileges "
1502+ "have already been obtained is **not** a vulnerability in CPython, since the "
1503+ "OS security boundary was already crossed."
1504+ msgstr ""
1505+
1506+ #: ../../howto/remote_debugging.rst:652
1507+ msgid ""
1508+ "Crashes or memory errors when reading a compromised process are not "
1509+ "vulnerabilities"
1510+ msgstr ""
1511+
1512+ #: ../../howto/remote_debugging.rst:653
1513+ msgid ""
1514+ "A tool that reads internal interpreter state from a target process must "
1515+ "trust that memory to be well-formed. If the target process has been "
1516+ "corrupted or is controlled by an attacker, the debugger or profiler may "
1517+ "crash, produce garbage output, or behave unpredictably. This is the same "
1518+ "risk accepted by every ``ptrace``-based debugger. Bugs in this category "
1519+ "(buffer overflows, segmentation faults, or undefined behaviour triggered by "
1520+ "reading corrupted state) are **not** treated as security issues, though "
1521+ "fixes that improve robustness are welcome."
1522+ msgstr ""
1523+
1524+ #: ../../howto/remote_debugging.rst:662
1525+ msgid "Vulnerabilities in the target process are not in scope"
1526+ msgstr ""
1527+
1528+ #: ../../howto/remote_debugging.rst:663
1529+ msgid ""
1530+ "If the Python process being debugged has already been compromised, the "
1531+ "attacker already controls execution in that process. Demonstrating further "
1532+ "impact from that starting point does not constitute a vulnerability in the "
1533+ "remote debugging protocol."
1534+ msgstr ""
1535+
1536+ #: ../../howto/remote_debugging.rst:669
1537+ msgid "When to use ``PYTHON_DISABLE_REMOTE_DEBUG``"
1538+ msgstr ""
1539+
1540+ #: ../../howto/remote_debugging.rst:671
1541+ msgid ""
1542+ "The environment variable :envvar:`PYTHON_DISABLE_REMOTE_DEBUG` (and the "
1543+ "equivalent :option:`-X disable_remote_debug` flag) allows operators to "
1544+ "disable the in-process side of the protocol as a **defence-in-depth** "
1545+ "measure. This may be useful in hardened or sandboxed deployment "
1546+ "environments where no debugging or profiling of the process is expected and "
1547+ "reducing attack surface is a priority, even though the OS-level privilege "
1548+ "checks already prevent unprivileged access."
1549+ msgstr ""
1550+
1551+ #: ../../howto/remote_debugging.rst:679
1552+ msgid ""
1553+ "Setting this variable does **not** affect other OS-level debugging "
1554+ "interfaces (``ptrace``, ``/proc``, ``task_for_pid``, etc.), which remain "
1555+ "available according to their own permission models."
1556+ msgstr ""
0 commit comments