![]() ![]() | ![]() |
Lowercase, and add a link for ARM. I don't know which of these we support.
1: [[!meta title="Meltdown and Spectre Status Page"]] 2: 3: Status of the Fixes 4: ------------------- 5: 6: ## Spectre Variant 1 7: 8: [[!table data=""" 9: Port |Vendor/Model |Spectre (V1) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current 10: amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 11: amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 12: amd64 |VIA |Unknown | | | | 13: i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 14: i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 15: i386 |VIA |Unknown | | | | 16: mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 17: mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 18: mips |Other Models |Not vulnerable | | | | 19: """]] 20: 21: Notes: 22: 23: * VIA Technologies did not issue any statement. 24: 25: ## Spectre Variant 2 26: 27: [[!table data=""" 28: Port |Vendor/Model |Spectre (V2) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current 29: amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 30: amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 31: amd64 |VIA |Unknown | | | | 32: i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 33: i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 34: i386 |VIA |Unknown | | | | 35: mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 36: mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed 37: mips |Other Models |Not vulnerable | | | | 38: """]] 39: 40: Notes: 41: 42: * VIA Technologies did not issue any statement. 43: 44: * Neither Intel, nor AMD, has issued a stable microcode update. 45: 46: ## Meltdown 47: 48: [[!table data=""" 49: Port |Vendor/Model |Meltdown (V3) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current 50: amd64 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Fixed with SVS 51: amd64 |AMD |Not vulnerable | | | | 52: amd64 |VIA |Unknown | | | | 53: i386 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed 54: i386 |AMD |Not vulnerable | | | | 55: i386 |VIA |Unknown | | | | 56: MIPS |MIPS P5600 |Not vulnerable | | | | 57: MIPS |MIPS P6600 |Not vulnerable | | | | 58: MIPS |Other Models |Not vulnerable | | | | 59: """]] 60: 61: Notes: 62: 63: * VIA Technologies did not issue any statement. 64: 65: ## External Resources 66: 67: * [MIPS Blog Post](https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/) 68: * [ARM Security Update](https://developer.arm.com/support/security-update) 69: