1: [[!meta title="Meltdown and Spectre Status Page"]]
2:
3: Status of the Fixes
4: -------------------
5:
6: ## Spectre Variant 1
7:
8: [[!table data="""
9: Port |Vendor/Model |Spectre (V1) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current
10: amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
11: amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
12: amd64 |VIA |Unknown | | | |
13: i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
14: i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
15: i386 |VIA |Unknown | | | |
16: mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
17: mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
18: mips |Other Models |Not vulnerable | | | |
19: ia64 |Intel |Not vulnerable | | | |
20: riscv |(Spec.) |Not vulnerable | | | |
21: """]]
22:
23: ## Spectre Variant 2
24:
25: [[!table data="""
26: Port |Vendor/Model |Spectre (V2) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current
27: amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
28: amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
29: amd64 |VIA |Unknown | | | |
30: i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
31: i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
32: i386 |VIA |Unknown | | | |
33: mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
34: mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed
35: mips |Other Models |Not vulnerable | | | |
36: ia64 |Intel |Not vulnerable | | | |
37: riscv |(Spec.) |Not vulnerable | | | |
38: """]]
39:
40: ## Meltdown
41:
42: [[!table data="""
43: Port |Vendor/Model |Meltdown (V3) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current
44: amd64 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Fixed with SVS
45: amd64 |AMD |Not vulnerable | | | |
46: amd64 |VIA |Unknown | | | |
47: i386 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed
48: i386 |AMD |Not vulnerable | | | |
49: i386 |VIA |Unknown | | | |
50: mips |MIPS P5600 |Not vulnerable | | | |
51: mips |MIPS P6600 |Not vulnerable | | | |
52: mips |Other Models |Not vulnerable | | | |
53: ia64 |Intel |Not vulnerable | | | |
54: riscv |(Spec.) |Not vulnerable | | | |
55: """]]
56:
57: ## External Resources
58:
59: * [MIPS Blog Post](https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/)
60: * [ARM Security Update](https://developer.arm.com/support/security-update)
61: * [RISC-V](https://riscv.org/2018/01/more-secure-world-risc-v-isa/)
62:
63: ## Notes
64:
65: * VIA Technologies did not issue any statement regarding their CPUs. It is not currently known whether they are affected.
66: * For Spectre Variant 2, neither Intel, nor AMD, has issued a stable microcode update.
67:
CVSweb for NetBSD wikisrc <wikimaster@NetBSD.org> software: FreeBSD-CVSweb