Message boards :
Number crunching :
13 Security Vulnerabilities and Manufacturer Backdoors Exposed In AMD Ryzen Processors
Message board moderation
Author | Message |
---|---|
Cliff Harding Send message Joined: 18 Aug 99 Posts: 1432 Credit: 110,967,840 RAC: 67 |
Those of you that have AMD's Ryzen processors should read this. http://www.guru3d.com/news-story/13-critical-security-vulnerabilities-and-manufacturer-backdoors-discovered-in-amd-ryzen-processors.html I don't buy computers, I build them!! |
Gary Charpentier Send message Joined: 25 Dec 00 Posts: 30651 Credit: 53,134,872 RAC: 32 |
Those of you that have AMD's Ryzen processors should read this. That should be those of you who own AMD stock should read this ... Currently, there is speculation that this information release is an attempt to manipulate the stock price of AMD. The short seller Viceroy Research would possibly play a role in this. That company published relatively quickly after CTS the claim that the 'revelations' would be the death blow for AMD. |
Al Send message Joined: 3 Apr 99 Posts: 1682 Credit: 477,343,364 RAC: 482 |
This post from there pretty well sums it up: I just don't understand whats going on with publishing these vulnerabilities. First Intel and AMD, now just AMD. |
Sirius B Send message Joined: 26 Dec 00 Posts: 24879 Credit: 3,081,182 RAC: 7 |
The SEC already took action against one company: Ms Holmes will lose control of the firm and be fined $500,000.If it's a similar case, whoever's involved will receive a nice sting. :-) |
Grant (SSSF) Send message Joined: 19 Aug 99 Posts: 13736 Credit: 208,696,464 RAC: 304 |
It's looking very much like some stock beatup. Yes, there are vulnerabilities. However, it's nothing like it was initially presented as. The salient high-level takeaway from AMD is this: AMD Confirms CTS-Labs Exploits: All To Be Patched In Weeks Grant Darwin NT |
Mike Send message Joined: 17 Feb 01 Posts: 34258 Credit: 79,922,639 RAC: 80 |
However, Papermaster emphasized that to exploit the gaps, a potential attacker must have full access to the system. However, with these rights, Ryzenfall & Co. are basically irrelevant again, because if the attacker has managed to exploit the gaps, he already has full system rights and no longer needs the gaps to exploit them. Nevertheless, AMD promised to close the gaps by firmware updates. This should happen in the next few weeks and go hand in hand without loss of performance. Translated from Planet3DNow.de With each crime and every kindness we birth our future. |
©2024 University of California
SETI@home and Astropulse are funded by grants from the National Science Foundation, NASA, and donations from SETI@home volunteers. AstroPulse is funded in part by the NSF through grant AST-0307956.