In 2018 and 2019, multiple hardware vulnerabilities in Intel processors have been revealed. Other vendors were also affected in some instances. This page collects which Lightning Wire Labs Appliances are affected by which vulnerability.
All appliances ever sold with an Intel processor are capable of running IPFire in 64 bit. If you are running a 32 bit release, please upgrade.
spectre-meltdown-checker script is available as an add-on package from Core Update 129 to detect these vulnerabilities as well as any potentially deployed mitigations.
|Hardware||IPFire Enterprise Appliance||IPFire Business Appliance / IPFire Office Appliance||IPFire Mini Appliance|
|Simultaneous Multi-Threading (SMT)||Yes15||N/V||N/V|
|Spectre v11||OK (M2)||OK (M16)||OK (M2)|
|Spectre v23||OK (M.4)||OK (M.4)||OK (M.4)|
|Spectre v3/Meltdown5||OK (M6)||OK (NV)||OK (NV)|
|Spectre v3a7||OK (M)||OK (M17)||OK (NV)|
|Spectre v48||OK (M)||OK (M9)||OK (M9)|
|Foreshadow (SGX)10||OK (NV)||OK (NV)||OK (NV)|
|Foreshadow-NG (OS)11||OK (M12)||OK (NV)||OK (NV)|
|Foreshadow-NG (VMM)13||OK (NV)||OK (NV)||OK (NV)|
|MDS (RIDL/Fallout/ZombieLoad)||OK (M14)||OK (NV)||OK (NV)|
PTE Inversion ↩
disabled for mitigation ↩
usercopy/swapgs barriers and __user pointer sanitization ↩
Mitigated in microcode ↩