[[!meta title="Meltdown and Spectre Status Page"]] Status of the Fixes ------------------- NetBSD-6, and all the anterior releases, have no planned fixes. ## Spectre Variant 1 [[!table data=""" Port |Vendor/Model |Spectre (V1) |NetBSD-7 |NetBSD-8 |NetBSD-current amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed amd64 |VIA |Unknown | | | i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed i386 |VIA |Unknown | | | mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed mips |Other Models |Not vulnerable | | | ia64 |Intel |Not vulnerable | | | riscv |(Spec.) |Not vulnerable | | | """]] ## Spectre Variant 2 [[!table data=""" Port |Vendor/Model |Spectre (V2) |NetBSD-7 |NetBSD-8 |NetBSD-current amd64 |Intel |Vulnerable |Not fixed |Not fixed |Fixed [MitigB] amd64 |AMD |Vulnerable |Not fixed |Not fixed |Fixed [MitigC] amd64 |VIA |Unknown | | | i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed i386 |VIA |Unknown | | | mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed mips |Other Models |Not vulnerable | | | ia64 |Intel |Not vulnerable | | | riscv |(Spec.) |Not vulnerable | | | """]] ## Meltdown [[!table data=""" Port |Vendor/Model |Meltdown (V3) |NetBSD-7 |NetBSD-8 |NetBSD-current amd64 |Intel |Vulnerable |Not fixed |Not fixed |Fixed [MitigA] amd64 |AMD |Not vulnerable | | | amd64 |VIA |Unknown | | | i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed i386 |AMD |Not vulnerable | | | i386 |VIA |Unknown | | | mips |MIPS P5600 |Not vulnerable | | | mips |MIPS P6600 |Not vulnerable | | | mips |Other Models |Not vulnerable | | | ia64 |Intel |Not vulnerable | | | riscv |(Spec.) |Not vulnerable | | | """]] ## Mitigations ### Mitigation A: SVS Meltdown is mitigated with the SVS feature. It can be dynamically disabled by changing the "machdep.svs.enabled" sysctl. ### Mitigation B: Intel IBRS SpectreV2 can be mitigated with the IBRS method (Intel only for now). If the CPU supports this method, it is used automatically. It can be dynamically disabled by changing the "machdep.spectre_v2.mitigated" sysctl. ### Mitigation C: AMD DIS_IND SpectreV2 can be mitigated with the DIS_IND method, available only on a few AMD families. If the CPU supports this method, it is used automatically. It can be dynamically disabled by changing the "machdep.spectre_v2.mitigated" sysctl. ## External Resources * [MIPS Blog Post](https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/) * [ARM Security Update](https://developer.arm.com/support/security-update) * [RISC-V](https://riscv.org/2018/01/more-secure-world-risc-v-isa/) ## Notes * VIA Technologies did not issue any statement regarding their CPUs. It is not currently known whether they are affected. * For Spectre Variant 2, neither Intel, nor AMD, has issued a stable microcode update.