Forum › Forums › Orphaned Posts › antiX-17 “Heather Heyer, Helen Keller” › Vulnerability L1TF, Meltdown
- This topic has 2 replies, 2 voices, and was last updated Oct 30-4:21 am by pebkac.
-
AuthorPosts
-
October 30, 2018 at 1:41 am #12842Member
pebkac
Hi
I have installed Antix-17.1 on my Apple Powerbook Pro 1.1.
Dual boot, next to OS-X “Snow Leopard” 10.6.8.
Then apt-get update and apt-get dist-upgrade.So far, so good. Most “engines are running”, except built-in cam.
But that doesn’t matter.After playing around a little bit, inxi -zv8 shows me
a vulnerability for l1tf and meltdown. See CPU section.So I made a kernel upgrade with 4.9.126 i486 non pae, as recommended.
Checking again, inxi still shows this vulnerability.Is this normal or should I try another kernel?
System: Host: antix1mc Kernel: 4.9.126-antix.1-486-smp i686 bits: 32 compiler: gcc v: 6.3.0 Desktop: IceWM 1.4.2 info: icewmtray dm: SLiM 1.3.4 Distro: antiX-17.1_386-full Heather Heyer 17 March 2018 base: Debian GNU/Linux 9 (stretch) Machine: Type: Portable System: Apple product: MacBookPro1,1 v: 1.0 serial: <filter> Chassis: type: 8 v: Mac-F425BEC8 serial: <filter> Mobo: Apple model: Mac-F425BEC8 v: PVT serial: <filter> BIOS: Apple v: MBP11.88Z.0055.B08.0610121325 date: 10/12/06 Battery: ID-1: BAT0 charge: 60.8 Wh condition: 61.9/60.5 Wh (102%) volts: 11.8/10.8 model: LMP ASMB012 type: Li-ion serial: N/A status: Discharging cycles: 1 Memory: RAM: total: 1.95 GiB used: 108.7 MiB (5.4%) RAM Report: permissions: Unable to run dmidecode. Are you root? PCI Slots: Permissions: Unable to run dmidecode. Are you root? CPU: Topology: Dual Core model: Intel 1400 bits: 32 type: MCP arch: M Yonah family: 6 model-id: E (14) stepping: 8 microcode: N/A L2 cache: 2048 KiB bogomips: 7323 Speed: 1000 MHz min/max: 1000/1833 MHz Core speeds (MHz): 1: 1000 2: 1000 Flags: acpi aperfmperf apic bts clflush cmov constant_tsc cx8 de dtherm dts est fpu fxsr ht mca mce mmx monitor msr mtrr nx pae pbe pdcm pge pni pse sep ss sse sse2 tm tm2 tsc vme vmx xtpr Vulnerabilities: Type: l1tf status: Vulnerable Type: meltdown status: Vulnerable Type: spec_store_bypass status: Not affected Type: spectre_v1 mitigation: __user pointer sanitization Type: spectre_v2 mitigation: Full generic retpolineOctober 30, 2018 at 1:59 am #12843Forum Admin
anticapitalista
::Hello!
Those messages in inxi just show what vulnerabilities affect your hardware.
The 4.9.126-antix.1-486-smp kernel is fully patched to take into account those vulnerabilities.
So, nothing to worry about.Philosophers have interpreted the world in many ways; the point is to change it.
antiX with runit - leaner and meaner.
October 30, 2018 at 4:21 am #12845Memberpebkac
-
AuthorPosts
- You must be logged in to reply to this topic.