12 Enero, 2018
"While we believe that AMD's processor architectures make it difficult to exploit Variant 2, we continue to work closely with the industry on this threat", Chief Technology Officer Mark Papermaster wrote in a blog post on Thursday wrote. The pledge starts with "customer-first urgency". It turns out the patches had bugs of their own. On Tuesday, Microsoft temporarily paused sending software updates to some devices with AMD processors after discovering some machines were rendered unusable. Although there has been no public report of a successful mass attack campaign using the vulnerabilities, there have been a few proof-of-concept attack vectors that have been successful in the lab, called Spectre and Meltdown.
"This is exactly the type of report of suspicious trading that the SEC routinely investigates, as well as the DOJ, " said Brandon Garrett, a professor at the University of Virginia School of Law.
During the 35th anniversary of the religious program "Ang Dating Daan" on October 13, the Ang Dating Daan chorale has bagged the newest Guinness World Record for the largest gospel choir.
Intel's Meltdown fix freaked out some Broadwells, Haswells
But investors believed AMD's chips were at less risk than that of key rival Intel. "AMD and Microsoft have been working on an update to resolve the issue and expect it to begin rolling out again for those impacted shortly". CPUs are used on personal computers, smartphones, servers and other devices. Because the flaw is in the processor architecture, a permanent solution will require a fix in future chip designs. However, safe working updates from Microsoft should resume by next week.
How can we patch vulnerabilities on AMD?
As this is a dynamic situation with lots of unanswered questions, information is being compiled and we will be emailing anyone who wants suggestions once all of the updates have been clearly articulated.