Skip to content

Commit e4f603a

Browse files
Update translation
Co-Authored-By: Adorilson Bezerra <adorilson@gmail.com>
1 parent 7a1a36c commit e4f603a

File tree

7 files changed

+883
-790
lines changed

7 files changed

+883
-790
lines changed

howto/remote_debugging.po

Lines changed: 88 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ msgid ""
1212
msgstr ""
1313
"Project-Id-Version: Python 3.14\n"
1414
"Report-Msgid-Bugs-To: \n"
15-
"POT-Creation-Date: 2026-01-23 14:20+0000\n"
15+
"POT-Creation-Date: 2026-04-03 14:38+0000\n"
1616
"PO-Revision-Date: 2025-09-16 00:00+0000\n"
1717
"Last-Translator: Rafael Fontenelle <rffontenelle@gmail.com>, 2025\n"
1818
"Language-Team: Portuguese (Brazil) (https://app.transifex.com/python-doc/"
@@ -1467,3 +1467,90 @@ msgid ""
14671467
msgstr ""
14681468
"Retoma o processo (se suspenso). O script será executado no próximo ponto de "
14691469
"avaliação seguro."
1470+
1471+
#: ../../howto/remote_debugging.rst:631
1472+
msgid "Security and threat model"
1473+
msgstr ""
1474+
1475+
#: ../../howto/remote_debugging.rst:633
1476+
msgid ""
1477+
"The remote debugging protocol relies on the same operating system primitives "
1478+
"used by native debuggers such as GDB and LLDB. Attaching to a process "
1479+
"requires the **same privileges** that those debuggers require, for example "
1480+
"``ptrace`` / Yama LSM on Linux, ``task_for_pid`` on macOS, and "
1481+
"``SeDebugPrivilege`` on Windows. Python does not introduce any new "
1482+
"privilege escalation path; if an attacker already possesses the permissions "
1483+
"needed to attach to a process, they could equally use GDB to read memory or "
1484+
"inject code."
1485+
msgstr ""
1486+
1487+
#: ../../howto/remote_debugging.rst:642
1488+
msgid ""
1489+
"The following principles define what is, and is not, considered a security "
1490+
"vulnerability in this feature:"
1491+
msgstr ""
1492+
1493+
#: ../../howto/remote_debugging.rst:645
1494+
msgid "Attaching requires OS-level privileges"
1495+
msgstr ""
1496+
1497+
#: ../../howto/remote_debugging.rst:646
1498+
msgid ""
1499+
"On every supported platform the operating system gates cross-process memory "
1500+
"access behind privilege checks (``CAP_SYS_PTRACE``, root, or administrator "
1501+
"rights). A report that demonstrates an issue only after these privileges "
1502+
"have already been obtained is **not** a vulnerability in CPython, since the "
1503+
"OS security boundary was already crossed."
1504+
msgstr ""
1505+
1506+
#: ../../howto/remote_debugging.rst:652
1507+
msgid ""
1508+
"Crashes or memory errors when reading a compromised process are not "
1509+
"vulnerabilities"
1510+
msgstr ""
1511+
1512+
#: ../../howto/remote_debugging.rst:653
1513+
msgid ""
1514+
"A tool that reads internal interpreter state from a target process must "
1515+
"trust that memory to be well-formed. If the target process has been "
1516+
"corrupted or is controlled by an attacker, the debugger or profiler may "
1517+
"crash, produce garbage output, or behave unpredictably. This is the same "
1518+
"risk accepted by every ``ptrace``-based debugger. Bugs in this category "
1519+
"(buffer overflows, segmentation faults, or undefined behaviour triggered by "
1520+
"reading corrupted state) are **not** treated as security issues, though "
1521+
"fixes that improve robustness are welcome."
1522+
msgstr ""
1523+
1524+
#: ../../howto/remote_debugging.rst:662
1525+
msgid "Vulnerabilities in the target process are not in scope"
1526+
msgstr ""
1527+
1528+
#: ../../howto/remote_debugging.rst:663
1529+
msgid ""
1530+
"If the Python process being debugged has already been compromised, the "
1531+
"attacker already controls execution in that process. Demonstrating further "
1532+
"impact from that starting point does not constitute a vulnerability in the "
1533+
"remote debugging protocol."
1534+
msgstr ""
1535+
1536+
#: ../../howto/remote_debugging.rst:669
1537+
msgid "When to use ``PYTHON_DISABLE_REMOTE_DEBUG``"
1538+
msgstr ""
1539+
1540+
#: ../../howto/remote_debugging.rst:671
1541+
msgid ""
1542+
"The environment variable :envvar:`PYTHON_DISABLE_REMOTE_DEBUG` (and the "
1543+
"equivalent :option:`-X disable_remote_debug` flag) allows operators to "
1544+
"disable the in-process side of the protocol as a **defence-in-depth** "
1545+
"measure. This may be useful in hardened or sandboxed deployment "
1546+
"environments where no debugging or profiling of the process is expected and "
1547+
"reducing attack surface is a priority, even though the OS-level privilege "
1548+
"checks already prevent unprivileged access."
1549+
msgstr ""
1550+
1551+
#: ../../howto/remote_debugging.rst:679
1552+
msgid ""
1553+
"Setting this variable does **not** affect other OS-level debugging "
1554+
"interfaces (``ptrace``, ``/proc``, ``task_for_pid``, etc.), which remain "
1555+
"available according to their own permission models."
1556+
msgstr ""

0 commit comments

Comments
 (0)