Annotation of wikisrc/security/meltdown_spectre.mdwn, revision 1.14
1.6 maxv 1: [[!meta title="Meltdown and Spectre Status Page"]]
1.1 maxv 2:
3: Status of the Fixes
4: -------------------
5:
1.7 maxv 6: ## Spectre Variant 1
7:
1.1 maxv 8: [[!table data="""
1.10 maxv 9: Port |Vendor/Model |Spectre (V1) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current
1.1 maxv 10: amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
1.5 maxv 11: amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
1.11 maxv 12: amd64 |VIA |Unknown | | | |
1.1 maxv 13: i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
1.5 maxv 14: i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
1.11 maxv 15: i386 |VIA |Unknown | | | |
1.12 maxv 16: mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
17: mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
18: mips |Other Models |Not vulnerable | | | |
1.14 ! maxv 19: ia64 |Intel |Not vulnerable | | | |
1.1 maxv 20: """]]
21:
1.7 maxv 22: ## Spectre Variant 2
23:
1.1 maxv 24: [[!table data="""
1.10 maxv 25: Port |Vendor/Model |Spectre (V2) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current
1.1 maxv 26: amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
1.5 maxv 27: amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
1.11 maxv 28: amd64 |VIA |Unknown | | | |
1.1 maxv 29: i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
1.5 maxv 30: i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
1.11 maxv 31: i386 |VIA |Unknown | | | |
1.12 maxv 32: mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
33: mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
34: mips |Other Models |Not vulnerable | | | |
1.14 ! maxv 35: ia64 |Intel |Not vulnerable | | | |
1.1 maxv 36: """]]
37:
1.7 maxv 38: ## Meltdown
39:
1.1 maxv 40: [[!table data="""
1.10 maxv 41: Port |Vendor/Model |Meltdown (V3) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current
1.1 maxv 42: amd64 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Fixed with SVS
1.11 maxv 43: amd64 |AMD |Not vulnerable | | | |
44: amd64 |VIA |Unknown | | | |
1.1 maxv 45: i386 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed
1.11 maxv 46: i386 |AMD |Not vulnerable | | | |
47: i386 |VIA |Unknown | | | |
1.13 maxv 48: mips |MIPS P5600 |Not vulnerable | | | |
49: mips |MIPS P6600 |Not vulnerable | | | |
50: mips |Other Models |Not vulnerable | | | |
1.14 ! maxv 51: ia64 |Intel |Not vulnerable | | | |
1.1 maxv 52: """]]
53:
1.10 maxv 54: ## External Resources
55:
1.11 maxv 56: * [MIPS Blog Post](https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/)
1.12 maxv 57: * [ARM Security Update](https://developer.arm.com/support/security-update)
1.10 maxv 58:
1.13 maxv 59: ## Notes
60:
61: * VIA Technologies did not issue any statement regarding their CPUs. It is not currently known whether they are affected.
62: * For Spectre Variant 2, neither Intel, nor AMD, has issued a stable microcode update.
63:
CVSweb for NetBSD wikisrc <wikimaster@NetBSD.org> software: FreeBSD-CVSweb