ASUS ROG Radeon RX 6750 XT STRIX review
AMD FidelityFX Super Resolution 2.0 - preview
Sapphire Radeon RX 6650 XT Nitro+ review
Sapphire Radeon RX 6950 XT Sapphire Nitro+ Pure review
Sapphire Radeon RX 6750 XT Nitro+ review
MSI Radeon RX 6950 XT Gaming X TRIO review
MSI Radeon RX 6750 XT Gaming X TRIO review
MSI Radeon RX 6650 XT Gaming X review
Deepcool AS500 PLUS CPU Cooler Review
Kioxia Exceria Pro 2 TB M.2 NVMe SSD Review
AMD: brief statement on Spectre/Windows Update issue
Earlier today we already posted news that some AMD platforms have issues with the new Microsoft Spectre and Meltdown patches. Some end-users ended up into systems not booting after Microsoft applied the patch.
AMD just send out a small statement on that, I'll just post that as -is:
-- AMD --
AMD is aware of an issue with some older generation processors following installation of a Microsoft security update that was published over the weekend. AMD and Microsoft have been working on an update to resolve the issue and expect it to begin rolling out again for these impacted shortly. Also, we wanted to make it clear this patch is to address GPZ Variant 1 (one of the variants of Spectre) and not GPZ Variant 3 (Meltdown).
« GALAX Releases GeForce GTX 1070 Ti Hall of Fame edition 8GB · AMD: brief statement on Spectre/Windows Update issue
· SteelSeries Announces Rival 600 Gaming Mouse »
Alessio1989
Senior Member
Posts: 2264
Joined: 2015-06-11
Senior Member
Posts: 2264
Joined: 2015-06-11
#5509067 Posted on: 01/09/2018 09:25 PM
Wasn't the update patching the Spectre variant 2, aka branch target injection (CVE-2017-5715)?
They ignore how their CPU are built (dispatching wrong technical information to Microsoft) and they ignore what are the issues too.
Oh it's AMD PR marketing, never mind...
Also, we wanted to make it clear this patch is to address GPZ Variant 1 (one of the variants of Spectre) and not GPZ Variant 3 (Meltdown).
Wasn't the update patching the Spectre variant 2, aka branch target injection (CVE-2017-5715)?
They ignore how their CPU are built (dispatching wrong technical information to Microsoft) and they ignore what are the issues too.
Oh it's AMD PR marketing, never mind...
RzrTrek
Senior Member
Posts: 2550
Joined: 2012-04-16
Senior Member
Posts: 2550
Joined: 2012-04-16
#5509071 Posted on: 01/09/2018 09:40 PM
The more I read about these security flaws the more I want to change to Ryzen.
The more I read about these security flaws the more I want to change to Ryzen.
Agent-A01
Senior Member
Posts: 11553
Joined: 2010-12-27
Senior Member
Posts: 11553
Joined: 2010-12-27
#5509079 Posted on: 01/09/2018 09:54 PM
Every device has some form of vulnerabilities. It's just a matter of time when it's unveiled.
The more I read about these security flaws the more I want to change to Ryzen.
Every device has some form of vulnerabilities. It's just a matter of time when it's unveiled.
WareTernal
Senior Member
Posts: 255
Joined: 2013-09-27
Senior Member
Posts: 255
Joined: 2013-09-27
#5509080 Posted on: 01/09/2018 10:00 PM
So, how will these users receive and apply the patch on non-booting systems?
Some end-users ended up into systems not booting
So, how will these users receive and apply the patch on non-booting systems?
Click here to post a comment for this news story on the message forum.
Senior Member
Posts: 260
Joined: 2017-09-25
Well what is new here, AMD gets always fuc**d even when they did nothing wrong