Reuse 4.3.3 (20071223) ====================== New functions for security violation detection are added: task_EnableSecurityViolationError task_IsSecurityViolation A decent version of the kernel patch (at least 2.6.23.9-cher1) is required to detect security violation errors. Security violation is detected in the following cases: o attempt to create a new process/thread via fork/clone or to execute another program via exec*; o attempt to use sockets, pipes or IPCs. Reuse 4.3.2 (20070802) ====================== New secure execution framework (ptrace-based) provided by the linux-2.6.22.1-cher1 kernel patch is supported.