AMD addresses Sinkclose vulnerability but older processors left unattended
- by nlqip
“AMD’s decision to exclude older processors from the ‘Sinkclose’ vulnerability patch risks damaging customer trust and brand loyalty,” said Arjun Chauhan, senior analyst at Everest Group. “Enterprises using these still-popular chips may feel neglected, leading to dissatisfaction and potentially driving them to consider competitors who offer longer support lifecycles.”
Notably, AMD’s recently released Ryzen 9000 and Ryzen AI 300 series processors are not included in the update list, though it is believed that these models may have had the vulnerability addressed at the factory.
For users of AMD’s older processors, the company recommends taking standard security precautions, though the absence of a patch may leave some systems more exposed to potential threats. Despite the sophisticated nature of the “Sinkclose” exploit, which typically requires access to the system kernel and is often associated with state-sponsored hackers, users are advised to stay vigilant.
Source link
lol
“AMD’s decision to exclude older processors from the ‘Sinkclose’ vulnerability patch risks damaging customer trust and brand loyalty,” said Arjun Chauhan, senior analyst at Everest Group. “Enterprises using these still-popular chips may feel neglected, leading to dissatisfaction and potentially driving them to consider competitors who offer longer support lifecycles.” Notably, AMD’s recently released Ryzen 9000…
Recent Posts
- Bob Sullivan Discovers a Scam That Strikes Twice
- A Vulnerability in Apache Struts2 Could Allow for Remote Code Execution
- CISA Adds One Known Exploited Vulnerability to Catalog | CISA
- Xerox To Buy Lexmark For $1.5B In Blockbuster Print Deal
- Vulnerability Summary for the Week of December 16, 2024 | CISA