[[!meta title="Meltdown and Spectre Status Page"]] Status of the Fixes ------------------- ## Spectre Variant 1 [[!table data=""" Port |Vendor/Model |Spectre (V1) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed amd64 |VIA |Unknown |- |- |- |- i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed i386 |VIA |Unknown |- |- |- |- MIPS |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed MIPS |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed MIPS |Other Models |Not vulnerable |- |- |- |- """]] Notes: * VIA Technologies did not issue any statement. ## Spectre Variant 2 [[!table data=""" Port |Vendor/Model |Spectre (V2) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current amd64 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed amd64 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed amd64 |VIA |Unknown |- |- |- |- i386 |Intel |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed i386 |AMD |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed i386 |VIA |Unknown |- |- |- |- MIPS |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed MIPS |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed MIPS |Other Models |Not vulnerable |- |- |- |- """]] Notes: * VIA Technologies did not issue any statement. * Neither Intel, nor AMD, has issued a stable microcode update. ## Meltdown [[!table data=""" Port |Vendor/Model |Meltdown (V3) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current amd64 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Fixed with SVS amd64 |AMD |Not vulnerable |- |- |- |- amd64 |VIA |Unknown |- |- |- |- i386 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed i386 |AMD |Not vulnerable |- |- |- |- i386 |VIA |Unknown |- |- |- |- MIPS |All Models |Not vulnerable |- |- |- |- """]] Notes: * VIA Technologies did not issue any statement. ## External Resources * [MIPS Blog Post] (https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/)