This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

classification
Title: ASLR and DEP protection
Type: security Stage: resolved
Components: Build Versions:
process
Status: closed Resolution: not a bug
Dependencies: Superseder:
Assigned To: Nosy List: Friedrich.Spee.von.Langenfeld, ned.deily
Priority: normal Keywords:

Created on 2014-11-26 18:48 by Friedrich.Spee.von.Langenfeld, last changed 2022-04-11 14:58 by admin. This issue is now closed.

Messages (2)
msg231723 - (view) Author: Friedrich Spee von Langenfeld (Friedrich.Spee.von.Langenfeld) Date: 2014-11-26 18:48
Are all binary files of a Python installation protected with techniques like Adress Space Layout Randomization and Data Execution Prevention? How can someone check this with an PE Editor or something similar? I know that this seems not to be a matter of great interest, but it would set an example to other programmers: Security is not an optional feature, but a necessity. Many thanks in advance.
msg231725 - (view) Author: Ned Deily (ned.deily) * (Python committer) Date: 2014-11-26 19:52
Python is supported on many platforms and the techniques and support for address layout randomization and similar techniques vary greatly.  Also, in many cases, Python is being used from a distribution built by a third-party, such as an operating system vendor or a third-party package manager, using their own preferred tooling and configurations.  In the specific case of Windows builds downloadable from python.org, it appears that ASLR and DEP have been enabled as of Python 3.4 (see Issue16632).
History
Date User Action Args
2022-04-11 14:58:10adminsetgithub: 67139
2014-11-26 19:52:19ned.deilysetstatus: open -> closed

nosy: + ned.deily
messages: + msg231725

resolution: not a bug
stage: resolved
2014-11-26 18:48:03Friedrich.Spee.von.Langenfeldcreate