Vulnerability L1TF, Meltdown

Forum Forums Orphaned Posts antiX-17 “Heather Heyer, Helen Keller” Vulnerability L1TF, Meltdown

  • This topic has 0 replies, 1 voice, and was last updated Oct 29-3:44 pm by pebkac.
Viewing 1 post (of 1 total)
  • Author
    Posts
  • #12835
    Member
    pebkac

      Hi
      I have installed Antix-17.1 on my Apple Powerbook Pro 1.1.
      Dual boot, next to OS-X “Snow Leopard” 10.6.8.
      Then apt-get update and apt-get dist-upgrade.

      So far, so good. Most “engines are running”, except built-in cam.
      But that doesn’t matter.

      After playing around a little bit, inxi -zv8 shows me
      a vulnerability for l1tf and meltdown.
      So I made a kernel upgrade with 4.9.126 i486 non pae, as recommended.
      Checking again, inxi still shows this vulnerability.

      Is this normal or should I try another kernel?

      System:    Host: antix1mc Kernel: 4.9.126-antix.1-486-smp i686 bits: 32 compiler: gcc v: 6.3.0 
                 Desktop: IceWM 1.4.2 info: icewmtray dm: SLiM 1.3.4 
                 Distro: antiX-17.1_386-full Heather Heyer 17 March 2018 
                 base: Debian GNU/Linux 9 (stretch) 
      Machine:   Type: Portable System: Apple product: MacBookPro1,1 v: 1.0 serial: <filter> Chassis: 
                 type: 8 v: Mac-F425BEC8 serial: <filter> 
                 Mobo: Apple model: Mac-F425BEC8 v: PVT serial: <filter> BIOS: Apple 
                 v: MBP11.88Z.0055.B08.0610121325 date: 10/12/06 
      Battery:   ID-1: BAT0 charge: 60.8 Wh condition: 61.9/60.5 Wh (102%) volts: 11.8/10.8 
                 model: LMP ASMB012 type: Li-ion serial: N/A status: Discharging cycles: 1 
      Memory:    RAM: total: 1.95 GiB used: 108.7 MiB (5.4%) 
                 RAM Report: permissions: Unable to run dmidecode. Are you root? 
      PCI Slots: Permissions: Unable to run dmidecode. Are you root? 
      CPU:       Topology: Dual Core model: Intel 1400 bits: 32 type: MCP arch: M Yonah family: 6 
                 model-id: E (14) stepping: 8 microcode: N/A L2 cache: 2048 KiB bogomips: 7323 
                 Speed: 1000 MHz min/max: 1000/1833 MHz Core speeds (MHz): 1: 1000 2: 1000 
                 Flags: acpi aperfmperf apic bts clflush cmov constant_tsc cx8 de dtherm dts est fpu 
                 fxsr ht mca mce mmx monitor msr mtrr nx pae pbe pdcm pge pni pse sep ss sse sse2 tm tm2 
                 tsc vme vmx xtpr 
                 Vulnerabilities: Type: l1tf status: Vulnerable 
                 Type: meltdown status: Vulnerable 
                 Type: spec_store_bypass status: Not affected 
                 Type: spectre_v1 mitigation: __user pointer sanitization 
                 Type: spectre_v2 mitigation: Full generic retpoline 
      • This topic was modified 4 years, 6 months ago by pebkac.
      • This topic was modified 4 years, 6 months ago by pebkac.
    Viewing 1 post (of 1 total)
    • You must be logged in to reply to this topic.