Ok. So now I have some stack protection or not at all ? I presume some ...
You have a LOT of stack protection, more than anything you get a regular Linux kernel (like in Fedora, Centos, Redhat, Ubuntu, etc.).
Run the ASL scanner on a non-ASL box and you'll see what I mean. Heres an ASL box:
Linux server 2.6.27.7-9.art.i686 #1 SMP Fri Dec 19 11:05:35 EST 2008 i686 i686 i386 GNU/Linux
Executable anonymous mapping : Killed
Executable bss : Killed
Executable data : Killed
Executable heap : Killed
Executable stack : Killed
Executable anonymous mapping (mprotect) : Killed
Executable bss (mprotect) : Killed
Executable data (mprotect) : Killed
Executable heap (mprotect) : Killed
Executable shared library bss (mprotect) : Killed
Executable shared library data (mprotect): Killed
Executable stack (mprotect) : Killed
Anonymous mapping randomisation test : 17 bits (guessed)
Heap randomisation test (ET_EXEC) : 13 bits (guessed)
Heap randomisation test (ET_DYN) : 23 bits (guessed)
Main executable randomisation (ET_EXEC) : 23 bits (guessed)
Main executable randomisation (ET_DYN) : 15 bits (guessed)
Shared library randomisation test : 17 bits (guessed)
Stack randomisation test (SEGMEXEC) : 23 bits (guessed)
Stack randomisation test (PAGEEXEC) : 23 bits (guessed)
Executable shared library bss : Killed
Executable shared library data : Killed
Writable text segments : Killed
Zero vulnerabilities on the ASL box.
Now heres a non ASL box with both exec-shield running and SELinux in enforce mode (Fedora in this case):
Mode: blackhat
Linux box1 2.6.27.21-78.2.41.fc9.i686 #1 SMP Mon Mar 23 23:45:58 EDT 2009 i686 i686 i386 GNU/Linux
Executable anonymous mapping : Killed
Executable bss : Killed
Executable data : Killed
Executable heap : Killed
Executable stack : Killed
Executable anonymous mapping (mprotect) : Vulnerable
Executable bss (mprotect) : Vulnerable
Executable data (mprotect) : Vulnerable
Executable heap (mprotect) : Vulnerable
Executable shared library bss (mprotect) : Vulnerable
Executable shared library data (mprotect): Vulnerable
Executable stack (mprotect) : Vulnerable
Anonymous mapping randomisation test : 16 bits (guessed)
Heap randomisation test (ET_EXEC) : 13 bits (guessed)
Heap randomisation test (ET_DYN) : 14 bits (guessed)
Main executable randomisation (ET_EXEC) : 5 bits (guessed)
Main executable randomisation (ET_DYN) : 12 bits (guessed)
Shared library randomisation test : No randomisation
Stack randomisation test (SEGMEXEC) : 19 bits (guessed)
Stack randomisation test (PAGEEXEC) : 19 bits (guessed)
Executable shared library bss : Vulnerable
Executable shared library data : Killed
Writable text segments : Vulnerable
Several vulnerabilities in the stack on a non-ASL box.