[[!meta title="Meltdown and Spectre Status Page"]] Status of the Fixes ------------------- ## Spectre Variant 1 [[!table data=""" Port |Vendor/Model |Spectre (V1) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current amd64 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed amd64 |AMD |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed amd64 |VIA |Unknown | | | | i386 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed i386 |AMD |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed i386 |VIA |Unknown | | | | mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed mips |Other Models |Not vulnerable | | | | ia64 |Intel |Not vulnerable | | | | riscv |(Spec.) |Not vulnerable | | | | """]] ## Spectre Variant 2 [[!table data=""" Port |Vendor/Model |Spectre (V2) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current amd64 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed amd64 |AMD |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed amd64 |VIA |Unknown | | | | i386 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed i386 |AMD |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed i386 |VIA |Unknown | | | | mips |MIPS P5600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed mips |MIPS P6600 |Vulnerable |Not fixed |Not fixed |Not fixed |Not fixed mips |Other Models |Not vulnerable | | | | ia64 |Intel |Not vulnerable | | | | riscv |(Spec.) |Not vulnerable | | | | """]] ## Meltdown [[!table data=""" Port |Vendor/Model |Meltdown (V3) |NetBSD-6 |NetBSD-7 |NetBSD-8 |NetBSD-current amd64 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Fixed [MitigA] amd64 |AMD |Not vulnerable | | | | amd64 |VIA |Unknown | | | | i386 |Intel |Vulnerable |No fix planned |Not fixed |Not fixed |Not fixed i386 |AMD |Not vulnerable | | | | i386 |VIA |Unknown | | | | mips |MIPS P5600 |Not vulnerable | | | | mips |MIPS P6600 |Not vulnerable | | | | mips |Other Models |Not vulnerable | | | | ia64 |Intel |Not vulnerable | | | | riscv |(Spec.) |Not vulnerable | | | | """]] ## Mitigations ### Mitigation A: SVS Meltdown is mitigated with the SVS feature. It can be dynamically disabled by changing the "machdep.svs.enabled" sysctl. ## External Resources * [MIPS Blog Post](https://www.mips.com/blog/mips-response-on-speculative-execution-and-side-channel-vulnerabilities/) * [ARM Security Update](https://developer.arm.com/support/security-update) * [RISC-V](https://riscv.org/2018/01/more-secure-world-risc-v-isa/) ## Notes * VIA Technologies did not issue any statement regarding their CPUs. It is not currently known whether they are affected. * For Spectre Variant 2, neither Intel, nor AMD, has issued a stable microcode update.