Actually I confirm this on current ubuntu bionic.
Would someone please reach the ubuntu security team and verify this is an intended choice?
evilaliv3@evilaliv3:~$ hardening-check /usr/bin/python3 /usr/bin/python3: Position Independent Executable: no, normal executable! Stack protected: yes Fortify Source functions: yes (some protected functions found) Read-only relocations: yes Immediate binding: no, not found!
hardening-check /usr/bin/python2 /usr/bin/python2: Position Independent Executable: yes Stack protected: yes Fortify Source functions: yes (some protected functions found) Read-only relocations: yes Immediate binding: yes
Actually I confirm this on current ubuntu bionic.
Would someone please reach the ubuntu security team and verify this is an intended choice?
evilaliv3@ evilaliv3: ~$ hardening-check /usr/bin/python3
/usr/bin/python3:
Position Independent Executable: no, normal executable!
Stack protected: yes
Fortify Source functions: yes (some protected functions found)
Read-only relocations: yes
Immediate binding: no, not found!
hardening-check /usr/bin/python2
/usr/bin/python2:
Position Independent Executable: yes
Stack protected: yes
Fortify Source functions: yes (some protected functions found)
Read-only relocations: yes
Immediate binding: yes