1: [[!meta title="Meltdown and Spectre Status Page"]]
2:
3: Status of the Fixes
4: -------------------
5:
6: ## Spectre Variant 1
7:
8: [[!table data="""
9: Port |Vendor/Model |Spectre (V1) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current
10: amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
11: amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
12: amd64 |VIA |Unknown | | | |
13: i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
14: i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
15: i386 |VIA |Unknown | | | |
16: mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
17: mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
18: mips |Other Models |Not vulnerable | | | |
19: """]]
20:
21: ## Spectre Variant 2
22:
23: [[!table data="""
24: Port |Vendor/Model |Spectre (V2) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current
25: amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
26: amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
27: amd64 |VIA |Unknown | | | |
28: i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
29: i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
30: i386 |VIA |Unknown | | | |
31: mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
32: mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
33: mips |Other Models |Not vulnerable | | | |
34: """]]
35:
36: ## Meltdown
37:
38: [[!table data="""
39: Port |Vendor/Model |Meltdown (V3) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current
40: amd64 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Fixed with SVS
41: amd64 |AMD |Not vulnerable | | | |
42: amd64 |VIA |Unknown | | | |
43: i386 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed
44: i386 |AMD |Not vulnerable | | | |
45: i386 |VIA |Unknown | | | |
46: mips |MIPS P5600 |Not vulnerable | | | |
47: mips |MIPS P6600 |Not vulnerable | | | |
48: mips |Other Models |Not vulnerable | | | |
49: """]]
50:
51: ## External Resources
52:
53: * [MIPS Blog Post](https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/)
54: * [ARM Security Update](https://developer.arm.com/support/security-update)
55:
56: ## Notes
57:
58: * VIA Technologies did not issue any statement regarding their CPUs. It is not currently known whether they are affected.
59: * For Spectre Variant 2, neither Intel, nor AMD, has issued a stable microcode update.
60:
CVSweb for NetBSD wikisrc <wikimaster@NetBSD.org> software: FreeBSD-CVSweb