Jump to content
Coaxialgamer

[Update] Security flaws discovered in AMD zen processors : AMD's meltdown?

wkdpaul

Please keep the conversation civil and respectful, as per the Community Standards;

Quote
  • Ensure a friendly atmosphere to our visitors and forum members.
  • Encourage the freedom of expression and exchange of information in a mature and responsible manner.
  • "Don't be a dick" - Wil Wheaton.
  • "Be excellent to each other" - Bill and Ted.
  • Remember your audience; both present and future.

 

Message added by wkdpaul

Recommended Posts

9 hours ago, VegetableStu said:

let's not listen to them anymore I guess. anyone knows if any third-party is looking into this firsthand?

Looking into what exactly?

AMD has confirmed that the exploits are real, and they are working on patches to fix them.

Link to post
Share on other sites
On 2018-03-21 at 9:24 AM, Blademaster91 said:

If it doesn't matter then why did AMD confirm these exploits to be real with bios updates? Opinions of some cyber security tech is just that, people should be taking these exploits seriously and at this point CTS doesn't matter when the exploits are real even though their way of going about releasing it to the public was terrible. Interesting bias some people have when it comes to AMD,if it were Intel having the exact same issue people wouldn't be defending their brand while constantly trying to play down the issue because of an unprofessional source.

Intel is having the same issue. They use as media chips affected as well.

Link to post
Share on other sites
11 hours ago, Razor01 said:

 

 

 

Wow someone really went out of their way and spent time and money on that ;).

 

Yeah know if we all give more attention to CTS labs, the better *sarcasm*

Please, do take note of the fact that site uses "HTTPS://", so already more secure and professional than the supposed security firm... 

 

http://www.cts-labs.com/

Link to post
Share on other sites
11 minutes ago, JuNex03 said:

Please, do take note of the fact that site uses "HTTPS://", so already more secure and professional than the supposed security firm... 

 

http://www.cts-labs.com/

 

 

Spending money and time to mock someone that really is insignificant......lol, Hope whom ever did that has AMD stock or some how invested in AMD.

Link to post
Share on other sites
3 minutes ago, Razor01 said:

 

 

Spending money and time to mock someone that really is insignificant......lol, Hope whom ever did that has AMD stock or some how invested in AMD.

image.png.4d155d0656c7481e2e6c37ac45110acb.png

Link to post
Share on other sites
31 minutes ago, JuNex03 said:

image.png.4d155d0656c7481e2e6c37ac45110acb.png

 

 

Yeah stupidity has no bounds, CTS labs is a privately owned company.  So? (not geared towards you, but the person that posted that)

 

I can see its a joke, but its a joke that gives CTS more publicity.  People don't know what they do.  A no name company getting publicity is the same thing if its bad or good publicity.

 

This guy gave so much importance to CTS he went and spent time to give them more of what they are craving.  Its stupidity unless there is a motive for this person to just that.

Link to post
Share on other sites
On 3/13/2018 at 7:26 PM, M.Yurizaki said:

The fact that people soft modded 4GB RX 480s to 8GB ones points more to AMD or its AIBs shipping 8GB models with 4GB firmware.

I wonder if there's anyway I could try doing that with my 470... I mean I think there were 8GB 470s.

 

My card probably isnt locking down an extra 4GB of ram.


| Whoosh - The Airplane and Airline Thread |

:x@Dan Castellaneta x @pinksnowbirdie || Jake x Tyler :x 52ever :x
Current Rig:
Spoiler

}} Titania  *December 22, 2017* {{

~Ryzen 7 1700 - Asus TUF B350 - Cryorig H7 - Crucial Ballistix Sport LT 8GB @ 2400MHz - XFX Double Dissipation RX 470 4GB - SanDisk SSDPlus 120GB - Toshiba 1TB HDD (2.5" 5400rpm) - Cooler Master Silencio 352 - LG DVD/CD Drive - EVGA SuperNova G2 550W - Windows 10 Education - Logitech G610 (MX Browns) - Corsair m65 Pro RGB~

Planned Upgrades:

Spoiler

}} Titania II  *Late 2018/Early 2019* {{

~Ryzen 7 1700 - Asus TUF B350 - Cryorig H7 - Corsair Vengeance LPX 16GB @ 3000MHz - XFX Double Dissipation RX 470 4GB- Samsung 860 Evo 500GB - Hitachi Ultrastar 7K3000 2TB HDD - Cooler Master Silencio 352 - LG DVD/CD Drive - AverMedia GC570 Capture Card - EVGA SuperNova G2 550W - Windows 10 Education - Logitech G610 (MX Browns) - Corsair m65 Pro RGB~

 

Link to post
Share on other sites
3 hours ago, derr12 said:

Intel is having the same issue. They use as media chips affected as well.

In that regard, it's interesting they decided to emphasize that "AMD did not provide a time estimate for patching CHIMERA"...

Link to post
Share on other sites
On 21/3/2018 at 11:10 PM, Taf the Ghost said:

@leadeater @LAwLz

 

I found a way to summarize the entire discussion!

 

"The Flaws are real, the News is fake".

 

That's actually what has been going on. Only Chimera is that interesting (as the other ones were going to be patchable), and there are far more Intel motherboards with those flawed USB controllers than there are AMD. CTS is clearly working for someone with some pockets, and this seems less like a stock manipulation and more like a Media-space attack, as time goes on.

 

That's fairly acceptable to say. Or put in another way: "These security flaws means a completely compromised system can be compromised".


Watching Intel have competition is like watching a headless chicken trying to get out of a mine field

CPU: Intel I7 4790K@4.6 with NZXT X31 AIO; MOTHERBOARD: ASUS Z97 Maximus VII Ranger; RAM: 8 GB Kingston HyperX 1600 DDR3; GFX: ASUS R9 290 4GB; CASE: Lian Li v700wx; STORAGE: Corsair Force 3 120GB SSD; Samsung 850 500GB SSD; Various old Seagates; PSU: Corsair RM650; MONITOR: 2x 20" Dell IPS; KEYBOARD/MOUSE: Logitech K810/ MX Master; OS: Windows 10 Pro

Link to post
Share on other sites
2 hours ago, Notional said:

 

That's fairly acceptable to say. Or put in another way: "These security flaws means a completely compromised system can be compromised".

You keep using the word "fully compromised", which is wrong. 

Admin access is objectively not "full privilege". 

 

Why do you keep insisting on using the wrong terms? The exploits are already fairly difficult and non-threatening. No need to lie in order to downplay them even further. 

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Recently Browsing   0 members

    No registered users viewing this page.


×