volumeicon-alsa-legacy in repos

I have added an older gtk2 version of the volumeicon application for antiX-17 and antiX-16 users.
The present one (gtk3) uses too much RAM in my opinion, whereas this version uses c10MB less!

apt-get install volumeicon-alsa-legacy

will automatically replace the existing one with the newer legacy version.

elogind available

For those who which to tinker, elogind is available for antiX-17 users.

elogind is the systemd project’s logind, extracted to a standalone package. It’s designed for users who prefer a non-systemd init system, but still want to use popular software such as KDE/Wayland or GNOME that otherwise hard-depends on systemd.

Security kernel upgrades

Now available in antiX stretch, buster, bullseye, testing and sid repos are security fixes for the ‘meltdown’, ‘spectre’, ‘Foreshadow’, CVE-2019-8912, Zombieload, “SACK Panic” and BlueZ kernel vulnerabilities, plus others. These versions are available.

5.10.142 (64bit and 32 bit pae and non-pae-486)
4.19.0-256 (64bit and 32 bit pae and non-pae-486)
4.9.0-326 (64 bit and 32 bit pae and non-pae-486)
4.4.0-296 (64 bit and 32 bit pae and non-pae-486)

Those using antiX-17 have these options at the moment.

1. Use the 4.9.0-294.antix.1 kernel (RECOMMENDED)
2. Use the 4.19.222 kernel
3. Use the 5.10.104 kernel
4. Use a patched Debian, MX, siduction kernel
5. Do nothing (not advised).

antiX-16/16.1/16.2 users have these options.

1. Use the 4.4.221.antix.1 kernel (RECOMMENDED)
2. Use the 4.9.91.antix.1 kernel now in jessie repo
3. Use a patched Debian kernel (3.16.0-6)
4. Do nothing (not advised)

antiX-13/13.2/13.2 users have these options.

1. Use a patched Debian kernel (3.2.0-4)
2. Do nothing (not advised)

For more information on ‘spectre’ and ‘meltdown’ have a read of this


edited on 03 October 2022 to show latest versions – anticapitalista

“spectre” and “meltdown” – 4.14.11 security kernel upgrades

I’m sure most people have heard about these kernel vulnerabilities by now. If not, have a read

I have uploaded ‘meltdown’ secure kernels for 4.14.11 for 64 bit to antiX stretch/testing and sid repos. Patching the default 4.10.5 kernel is not progressing very well since the patches are very complex and there are no existing patches for the 4.10 series (yet).

So, at this moment in time, here are your choices.

1. Do nothing
2. Wait for the 4.10.5 kernel gets patched (no idea when that will be)
3. Use an existing patched kernel from Debian stretch (4.9 series)
4. Use the 4.14.11 antiX patched kernel.