--- wikisrc/security/meltdown_spectre.mdwn 2018/03/01 12:08:04 1.12 +++ wikisrc/security/meltdown_spectre.mdwn 2018/03/01 12:12:21 1.13 @@ -18,10 +18,6 @@ mips |MIPS P6600 |Vulnerable |Not fixed mips |Other Models |Not vulnerable | | | | """]] -Notes: - -* VIA Technologies did not issue any statement. - ## Spectre Variant 2 [[!table data=""" @@ -37,12 +33,6 @@ mips |MIPS P6600 |Vulnerable |Not fixed mips |Other Models |Not vulnerable | | | | """]] -Notes: - -* VIA Technologies did not issue any statement. - -* Neither Intel, nor AMD, has issued a stable microcode update. - ## Meltdown [[!table data=""" @@ -53,17 +43,18 @@ amd64 |VIA |Unknown | | | | i386 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed i386 |AMD |Not vulnerable | | | | i386 |VIA |Unknown | | | | -MIPS |MIPS P5600 |Not vulnerable | | | | -MIPS |MIPS P6600 |Not vulnerable | | | | -MIPS |Other Models |Not vulnerable | | | | +mips |MIPS P5600 |Not vulnerable | | | | +mips |MIPS P6600 |Not vulnerable | | | | +mips |Other Models |Not vulnerable | | | | """]] -Notes: - -* VIA Technologies did not issue any statement. - ## External Resources * [MIPS Blog Post](https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/) * [ARM Security Update](https://developer.arm.com/support/security-update) +## Notes + +* VIA Technologies did not issue any statement regarding their CPUs. It is not currently known whether they are affected. +* For Spectre Variant 2, neither Intel, nor AMD, has issued a stable microcode update. +