In 2018 and 2019, multiple hardware vulnerabilities in Intel processors have been revealed. Other vendors were also affected in some instances. This page collects which Lightning Wire Labs Appliances are affected by which vulnerability.
All appliances ever sold with an Intel processor are capable of running IPFire in 64 bit. If you are running a 32 bit release, please upgrade.
spectre-meltdown-checker script is available as an add-on package from Core Update 129 to detect these vulnerabilities as well as any potentially deployed mitigations.
|Simultaneous Multi-Threading (SMT)||Yes((disabled for mitigation))||Not Supported|
|Spectre v1((CVE-2017-5753, bounds check bypass))|
|Spectre v2((CVE-2017-5715, branch target injection))|
|Spectre v3/Meltdown((CVE-2017-5754, rogue data cache load))|
|Spectre v3a((CVE-2018-3640, rogue system register read))|
|Spectre v4((CVE-2018-3639, speculative store bypass))|
|Foreshadow (SGX)((CVE-2018-3615, L1 terminal fault))|
|Foreshadow-NG (OS)((CVE-2018-3620, L1 terminal fault))|
|Foreshadow-NG (VMM)((CVE-2018-3646, L1 terminal fault))|