On Tue, Oct 10, 2017 at 02:16:28PM +0200, Vincent Lefevre wrote:
> On 2017-10-10 13:58:16 +0200, Moritz Muehlenhoff wrote:
> > This is neutralised by kernel hardening starting with stretch, see release 
> > notes:
> > https://www.debian.org/releases/jessie/amd64/release-notes/ch-whats-new.en.html#security
> 
> which is there just because of this kind of bugs.
> 
> Note also that this is still an optional feature, and not all users
> use Debian provided kernels.

It is not optional, see the release notes section I quoted. If you run a custom 
kernel
you need to enable it, otherwise you're on your own.

Cheers,
        Moritz

Reply via email to