The NetBSD team is experimenting with a new security feature called kernel address space layout randomization (KASLR). The new feature makes it more difficult for malicious users and programs to attack the kernel as the location of kernel components in memory will be different each time the computer boots. Maxime Villard writes, "Recently, I completed a Kernel ASLR implementation for NetBSD-amd64, making NetBSD the first BSD system to support such a feature. Simply said, KASLR is a feature that randomizes the location of the kernel in memory, making it harder to exploit several classes of vulnerabilities, both locally (privilege escalations) and remotely (remote code executions)." This new feature provides a different approach to kernel memory protection than OpenBSD's kernel address randomized link we talked about back in June.