Outdated AMD chips reportedly won’t get a patch for the ‘Sinkclose’ security flaw

AMD has begun releasing updates to patch some — but not all — chips affected by the recently discovered “Sinkclose” security flaw. The vulnerability spotted by researchers at IOActive was revealed in a report from Wired last week, and is said to affect most AMD processors going back to 2006. While AMD’s security team has been working to get some of these systems patched, Tom’s Hardware reports that the Ryzen 1000, 2000 and 3000 series along with the Threadripper 1000 and 2000 won’t get any such updates.

The company told Tom’s Hardware that these are among “older products that are outside our software support window.” Newer models and all of AMD’s embedded processors have reportedly already received or will be receiving the patch. The Sinkclose flaw is considered to be more of a risk for governments or other large entities than for the average user, and even then, taking advantage of it would require deep access to a particular system. But the researchers who found it warned that it could be disastrous if exploited, letting hackers run code in the chips’ normally protected System Management Mode.

This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/outdated-amd-chips-reportedly-wont-get-a-patch-for-the-sinkclose-security-flaw-200549740.html?src=rss

Leave a Reply

Your email address will not be published. Required fields are marked *

Join the Underground

a vibrant community where every pixel can be the difference between victory and defeat.

Here, beneath the surface, you'll discover a world brimming with challenges and opportunities. Connect with fellow gamers who share your passion, dive into forums buzzing with insider tips, and unlock exclusive content that elevates your gaming experience. The Underground isn't just a place—it's your new battleground. Are you ready to leave your mark? Join us now and transform your gaming journey into a saga of triumphs.