On Tue, Oct 10, 2017 at 02:16:28PM +0200, Vincent Lefevre wrote: > On 2017-10-10 13:58:16 +0200, Moritz Muehlenhoff wrote: > > This is neutralised by kernel hardening starting with stretch, see release > > notes: > > https://www.debian.org/releases/jessie/amd64/release-notes/ch-whats-new.en.html#security > > which is there just because of this kind of bugs. > > Note also that this is still an optional feature, and not all users > use Debian provided kernels.
It is not optional, see the release notes section I quoted. If you run a custom kernel you need to enable it, otherwise you're on your own. Cheers, Moritz