Vulnerability L1TF, Meltdown

Forum Forums Orphaned Posts antiX-17 “Heather Heyer, Helen Keller” Vulnerability L1TF, Meltdown

  • This topic has 2 replies, 2 voices, and was last updated Oct 30-4:21 am by pebkac.
Viewing 3 posts - 1 through 3 (of 3 total)
  • Author
    Posts
  • #12842
    Member
    pebkac

      Hi

      I have installed Antix-17.1 on my Apple Powerbook Pro 1.1.
      Dual boot, next to OS-X “Snow Leopard” 10.6.8.
      Then apt-get update and apt-get dist-upgrade.

      So far, so good. Most “engines are running”, except built-in cam.
      But that doesn’t matter.

      After playing around a little bit, inxi -zv8 shows me
      a vulnerability for l1tf and meltdown. See CPU section.

      So I made a kernel upgrade with 4.9.126 i486 non pae, as recommended.
      Checking again, inxi still shows this vulnerability.

      Is this normal or should I try another kernel?

      System:    Host: antix1mc Kernel: 4.9.126-antix.1-486-smp i686 bits: 32 compiler: gcc v: 6.3.0 
                 Desktop: IceWM 1.4.2 info: icewmtray dm: SLiM 1.3.4 
                 Distro: antiX-17.1_386-full Heather Heyer 17 March 2018 
                 base: Debian GNU/Linux 9 (stretch) 
      Machine:   Type: Portable System: Apple product: MacBookPro1,1 v: 1.0 serial: <filter> Chassis: 
                 type: 8 v: Mac-F425BEC8 serial: <filter> 
                 Mobo: Apple model: Mac-F425BEC8 v: PVT serial: <filter> BIOS: Apple 
                 v: MBP11.88Z.0055.B08.0610121325 date: 10/12/06 
      Battery:   ID-1: BAT0 charge: 60.8 Wh condition: 61.9/60.5 Wh (102%) volts: 11.8/10.8 
                 model: LMP ASMB012 type: Li-ion serial: N/A status: Discharging cycles: 1 
      Memory:    RAM: total: 1.95 GiB used: 108.7 MiB (5.4%) 
                 RAM Report: permissions: Unable to run dmidecode. Are you root? 
      PCI Slots: Permissions: Unable to run dmidecode. Are you root? 
      CPU:       Topology: Dual Core model: Intel 1400 bits: 32 type: MCP arch: M Yonah family: 6 
                 model-id: E (14) stepping: 8 microcode: N/A L2 cache: 2048 KiB bogomips: 7323 
                 Speed: 1000 MHz min/max: 1000/1833 MHz Core speeds (MHz): 1: 1000 2: 1000 
                 Flags: acpi aperfmperf apic bts clflush cmov constant_tsc cx8 de dtherm dts est fpu 
                 fxsr ht mca mce mmx monitor msr mtrr nx pae pbe pdcm pge pni pse sep ss sse sse2 tm tm2 
                 tsc vme vmx xtpr 
                 Vulnerabilities: Type: l1tf status: Vulnerable 
                 Type: meltdown status: Vulnerable 
                 Type: spec_store_bypass status: Not affected 
                 Type: spectre_v1 mitigation: __user pointer sanitization 
                 Type: spectre_v2 mitigation: Full generic retpoline 
      #12843
      Forum Admin
      anticapitalista
        Helpful
        Up
        0
        ::

        Hello!

        Those messages in inxi just show what vulnerabilities affect your hardware.
        The 4.9.126-antix.1-486-smp kernel is fully patched to take into account those vulnerabilities.
        So, nothing to worry about.

        Philosophers have interpreted the world in many ways; the point is to change it.

        antiX with runit - leaner and meaner.

        #12845
        Member
        pebkac
          Helpful
          Up
          0
          ::

          Ok, thank you very much for quick reply.
          Good to see, that’s OK.

          Have a nice day.

        Viewing 3 posts - 1 through 3 (of 3 total)
        • You must be logged in to reply to this topic.