File:  [NetBSD Developer Wiki] / wikisrc / security / meltdown_spectre.mdwn
Revision 1.14: download - view: text, annotated - select for diffs
Thu Mar 1 12:23:12 2018 UTC (5 years ago) by maxv
Branches: MAIN
CVS tags: HEAD
Add ia64, not vulnerable.

    1: [[!meta title="Meltdown and Spectre Status Page"]]
    2: 
    3: Status of the Fixes
    4: -------------------
    5: 
    6: ## Spectre Variant 1
    7: 
    8: [[!table data="""
    9: Port		|Vendor/Model	|Spectre (V1)	|NetBSD-6	|NetBSD-7	|NetBSD-8	|NetBSD-current
   10: amd64		|Intel		|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   11: amd64		|AMD		|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   12: amd64		|VIA		|Unknown	|		|		|		|
   13: i386		|Intel		|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   14: i386		|AMD		|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   15: i386		|VIA		|Unknown	|		|		|		|
   16: mips		|MIPS P5600	|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   17: mips		|MIPS P6600	|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   18: mips		|Other Models	|Not vulnerable	|		|		|		|
   19: ia64		|Intel		|Not vulnerable	|		|		|		|
   20: """]]
   21: 
   22: ## Spectre Variant 2
   23: 
   24: [[!table data="""
   25: Port		|Vendor/Model	|Spectre (V2)	|NetBSD-6	|NetBSD-7	|NetBSD-8	|NetBSD-current
   26: amd64		|Intel		|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   27: amd64		|AMD		|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   28: amd64		|VIA		|Unknown	|		|		|		|
   29: i386		|Intel		|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   30: i386		|AMD		|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   31: i386		|VIA		|Unknown	|		|		|		|
   32: mips		|MIPS P5600	|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   33: mips		|MIPS P6600	|Vulnerable	|Not fixed	|Not fixed	|Not fixed	|Not fixed
   34: mips		|Other Models	|Not vulnerable	|		|		|		|
   35: ia64		|Intel		|Not vulnerable	|		|		|		|
   36: """]]
   37: 
   38: ## Meltdown
   39: 
   40: [[!table data="""
   41: Port		|Vendor/Model	|Meltdown (V3)	|NetBSD-6	|NetBSD-7	|NetBSD-8	|NetBSD-current
   42: amd64		|Intel		|Vulnerable	|No fix planned	|Not fixed	|Not fixed	|Fixed with SVS
   43: amd64		|AMD		|Not vulnerable	|		|		|		|
   44: amd64		|VIA		|Unknown	|		|		|		|
   45: i386		|Intel		|Vulnerable	|No fix planned	|Not fixed	|Not fixed	|Not fixed
   46: i386		|AMD		|Not vulnerable	|		|		|		|
   47: i386		|VIA		|Unknown	|		|		|		|
   48: mips		|MIPS P5600	|Not vulnerable	|		|		|		|
   49: mips		|MIPS P6600	|Not vulnerable	|		|		|		|
   50: mips		|Other Models	|Not vulnerable	|		|		|		|
   51: ia64		|Intel		|Not vulnerable	|		|		|		|
   52: """]]
   53: 
   54: ## External Resources
   55: 
   56: * [MIPS Blog Post](https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/)
   57: * [ARM Security Update](https://developer.arm.com/support/security-update)
   58: 
   59: ## Notes
   60: 
   61: * VIA Technologies did not issue any statement regarding their CPUs. It is not currently known whether they are affected.
   62: * For Spectre Variant 2, neither Intel, nor AMD, has issued a stable microcode update.
   63: 

CVSweb for NetBSD wikisrc <wikimaster@NetBSD.org> software: FreeBSD-CVSweb