version 1.9, 2018/03/01 11:51:08
|
version 1.10, 2018/03/01 11:58:25
|
Line 6 Status of the Fixes
|
Line 6 Status of the Fixes
|
## Spectre Variant 1 |
## Spectre Variant 1 |
|
|
[[!table data=""" |
[[!table data=""" |
Port |CPU Vendor |Spectre (V1) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current |
Port |Vendor/Model |Spectre (V1) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current |
amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
amd64 |VIA |Unknown |Not fixed |Not fixed |Not fixed |Not fixed |
amd64 |VIA |Unknown |- |- |- |- |
i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
i386 |VIA |Unknown |Not fixed |Not fixed |Not fixed |Not fixed |
i386 |VIA |Unknown |- |- |- |- |
|
MIPS |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
|
MIPS |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
|
MIPS |Other Models |Not vulnerable |- |- |- |- |
"""]] |
"""]] |
|
|
Notes: |
Notes: |
Line 22 Notes:
|
Line 25 Notes:
|
## Spectre Variant 2 |
## Spectre Variant 2 |
|
|
[[!table data=""" |
[[!table data=""" |
Port |CPU Vendor |Spectre (V2) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current |
Port |Vendor/Model |Spectre (V2) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current |
amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
amd64 |VIA |Unknown |Not fixed |Not fixed |Not fixed |Not fixed |
amd64 |VIA |Unknown |- |- |- |- |
i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
i386 |VIA |Unknown |Not fixed |Not fixed |Not fixed |Not fixed |
i386 |VIA |Unknown |- |- |- |- |
|
MIPS |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
|
MIPS |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed |
|
MIPS |Other Models |Not vulnerable |- |- |- |- |
"""]] |
"""]] |
|
|
Notes: |
Notes: |
Line 40 Notes:
|
Line 46 Notes:
|
## Meltdown |
## Meltdown |
|
|
[[!table data=""" |
[[!table data=""" |
Port |CPU Vendor |Meltdown (V3) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current |
Port |Vendor/Model |Meltdown (V3) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current |
amd64 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Fixed with SVS |
amd64 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Fixed with SVS |
amd64 |AMD |Not vulnerable | | | | |
amd64 |AMD |Not vulnerable |- |- |- |- |
amd64 |VIA |Unknown | | | | |
amd64 |VIA |Unknown |- |- |- |- |
i386 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed |
i386 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed |
i386 |AMD |Not vulnerable | | | | |
i386 |AMD |Not vulnerable |- |- |- |- |
i386 |VIA |Unknown | | | | |
i386 |VIA |Unknown |- |- |- |- |
|
MIPS |All Models |Not vulnerable |- |- |- |- |
"""]] |
"""]] |
|
|
Notes: |
Notes: |
|
|
* VIA Technologies did not issue any statement. |
* VIA Technologies did not issue any statement. |
|
|
|
## External Resources |
|
|
|
* [MIPS Blog Post] (https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/) |
|
|