Jump to content
  • Sign Up
×
×
  • Create New...

AMD won’t patch all chips affected by severe data theft vulnerability — Ryzen 1000, 2000, and 3000 will not get patched, among others


Recommended Posts

  • Diamond Member

This is the hidden content, please

AMD won’t patch all chips affected by severe data theft vulnerability — Ryzen 1000, 2000, and 3000 will not get patched, among others

data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///ywAAAAAAQABAAACAUwAOw==

AMD processors dating back to 2006 reportedly suffer from a major security flaw that allows attackers to infiltrate a system virtually undetectable.

This is the hidden content, please
has since released updates for several processor families to mitigate this issue, but not all of them will be covered. According to a statement given to Tom’s Hardware, AMD said, “There are some older products that are outside our software support window.” AMD has no plans to update its Ryzen 1000, 2000, and 3000 series processors or its Threadripper 1000 and 2000 models.

Nevertheless, most of AMD’s recent processors have already received mitigation options to deal with the issue. This includes all generations of AMD’s EPYC processors for the data center, the latest Threadripper, and Ryzen processors. Its MI300A data center chips are also getting the patch. The company said there is “No performance impact expected” when asked about the consequences of the update. Thus, the company is likely still doing performance tests to fully assess patch impacts on overall system performance.

These are all the AMD chips that are expected to have, or already have, the security patch available:  

Swipe to scroll horizontally
Data Center Embedded Desktop HEDT Workstation Mobile
1st Gen AMD EPYC (Naples) AMD EPYC Embedded 3000 AMD Ryzen 5000 Series (Vermeer/Cezanne) AMD Ryzen Threadripper 3000 Series (Castle Peak) AMD Ryzen Threadripper PRO (Castle Peak) AMD Athlon 3000 Series with Radeon Graphics (Dali/Pollock)
2nd Gen AMD EPYC (Rome) AMD EPYC Embedded 7002 AMD Ryzen 7000 Series (Raphael) X3D AMD Ryzen Threadripper 7000 Series (Storm Peak) AMD Ryzen Threadripper PRO 3000WX (Chagall) AMD Ryzen 3000 Series with Radeon Graphics (Picasso)
3rd Gen AMD EPYC (Milan/Milan-X) AMD EPYC Embedded 7003 AMD Ryzen 4000 Series with Radeon Graphics (Renoir) Row 2 – Cell 3 Row 2 – Cell 4 AMD Ryzen 4000 Series with Radeon Graphics (Renoir)
4th Gen AMD EPYC (Genoa/Genoa-X/Bergamo/Siena) AMD EPYC Embedded 9003 AMD Ryzen 8000 Series with Radeon Graphics (Phoenix) Row 3 – Cell 3 Row 3 – Cell 4 AMD Ryzen 5000 Series with Radeon Graphics (Cezanne/Barcelo)
AMD Instinct MI300A AMD Ryzen Embedded R1000 Row 4 – Cell 2 Row 4 – Cell 3 Row 4 – Cell 4 AMD Ryzen 6000 Series with Radeon Graphics (Rembrandt)
Row 5 – Cell 0 AMD Ryzen Embedded R2000 Row 5 – Cell 2 Row 5 – Cell 3 Row 5 – Cell 4 AMD Ryzen 7020 Series with Radeon Graphics (Mendocino)
Row 6 – Cell 0 AMD Ryzen Embedded 5000 Row 6 – Cell 2 Row 6 – Cell 3 Row 6 – Cell 4 AMD Ryzen 7030 Series with Radeon Graphics (Barcelo-R)
Row 7 – Cell 0 AMD Ryzen Embedded 7000 Row 7 – Cell 2 Row 7 – Cell 3 Row 7 – Cell 4 AMD Ryzen 7035 Series with Radeon Graphics (Rembrandt-R)
Row 8 – Cell 0 AMD Ryzen Embedded V1000 Row 8 – Cell 2 Row 8 – Cell 3 Row 8 – Cell 4 AMD Ryzen 7040 Series with Radeon Graphics (Phoenix)
Row 9 – Cell 0 AMD Ryzen Embedded V2000 Row 9 – Cell 2 Row 9 – Cell 3 Row 9 – Cell 4 AMD Ryzen 7045 Series (Dragon Range)
Row 10 – Cell 0 AMD Ryzen Embedded V3000 Row 10 – Cell 2 Row 10 – Cell 3 Row 10 – Cell 4 AMD Ryzen with Radeon Graphics (Hawk Point)

These are all the chips that are flagged to receive an update so far, and it covers most of the recent processors. However, you’ll notice that several older processors, which are nonetheless popular with consumers, are not included in this list. These include the Ryzen 3000 and older processors and Threadripper 2000 and older chips. The latest Ryzen 9000 and Ryzen AI 300 series processors are also not included in the list, but these newly-released models might have had this vulnerability already addressed from the factory. We’re following up for clarity.

Attackers need to access the system kernel to exploit the Sinkclose vulnerability, which requires a sophisticated vector that is usually only used by state-sponsored hackers, so most casual users should take that into account.

Nevertheless, all Ryzen Embedded and EPYC Embedded systems will receive an update to patch the vulnerability. This is because most embedded machines are designed to run in the background 24/7 with little to no human intervention for several years, meaning they can be used as ******* vectors if not updated properly.

But even if you don’t have state secrets stashed in your personal computer, we still recommend updating your chips if you receive an update from AMD. That way, you ensure that you’re protected and won’t lose your data, even if the Sinkclose vulnerability becomes more widely used.



This is the hidden content, please

#AMD #wont #patch #chips #affected #severe #data #theft #vulnerability #Ryzen #patched #among

This is the hidden content, please

This is the hidden content, please

For verified travel tips and real support, visit: https://hopzone.eu/

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.