525
submitted 2 months ago by TheHolm@aussie.zone to c/selfhosted@lemmy.world

Here we are - 3600 which was still under manufacture 2-3 years ago are not get patched. Shame on you AMD, if it is true.

you are viewing a single comment's thread
view the rest of the comments
[-] Grippler@feddit.dk 16 points 2 months ago

No they are just choosing not to roll out the fix to a known issue, which is screwing customers over on purpose (to increase profits). It's not a matter of goodwill, they sold a product that then turned out to have a massive security flaw, and now they don't want to fix even though they absolutely could.

[-] victorz@lemmy.world 2 points 2 months ago

I'm guessing it's a balance between old products, effort, severity, etc. As we've learned, this is only an issue for an already infected system. 🤷‍♂️

[-] Grippler@feddit.dk 7 points 2 months ago* (last edited 2 months ago)

Ryzen 3000 series CPUs are still sold as new, I even bought one six months ago, they're no where near being classified as "old", they're hardly 5 years old. And this is not only an issue for already infected systems because uninfected systems will intentionally be left vulnerable.

[-] victorz@lemmy.world 1 points 2 months ago

Ryzen 3000 series CPUs are still sold as new

Ah, that changes things. Not great. But still,

uninfected systems will intentionally be left vulnerable

what I meant was that apparently only compromised systems are vulnerable to this defect.

[-] Grippler@feddit.dk 5 points 2 months ago

what I meant was that apparently only compromised systems are vulnerable to this defect.

That is not correct. Any system where this vulnerability is not patched out by AMD (which is all of gen 1, 2 and 3 CPUs) is left permanently vulnerable, regardless of whether or not they already are compromised. So if your PC is compromised in a few months for some reason, instead of being able to recover with a reinstall of your OS, your HW is now permanently compromised and would need to be thrown out...just because AMD didn't want to patch this.

[-] victorz@lemmy.world 1 points 2 months ago* (last edited 2 months ago)

What I meant was exactly that, which you corroborated as correct. You'd first have to already compromise these systems, in order to be able to exploit this vulnerability. That's as I understood it. It's that correct?

Gosh, it's not easy getting my point across here today, I'm sorry.

All I'm saying is that I don't think AMD is doing this to us, on purpose. I think it's just happened, and they're not handling it very well, even though it's somewhat understandable. At least to me. 🤷‍♂️

But then again, I have no reason to be attacked or have my system compromised, so my situation is better than others', perhaps.

[-] Grippler@feddit.dk 2 points 2 months ago

I think what most people disagree with, is that the active choice from AMD to not fix a very fixable issue, is a choice they know leaves customers is a seriously bad position. This is something they choose to do to their customers, because they could just as well choose to help them.

[-] victorz@lemmy.world 1 points 2 months ago

they could just as well choose to help them.

I think that's what I have a hard time believing. If they could "just as well" help, it is my belief that they also would. Because I don't think they're morons. I think they know this hurts their reputation. There has to be some obstacle, be it financial or lack of man power or... something. That is my belief.

Don't you (all) think that sounds more likely than them just leaving their customers in the dark for no other reason than not having to do work?

[-] Grippler@feddit.dk 1 points 2 months ago* (last edited 2 months ago)

Of course there's a financial reason, they've probably done a cost/benefit analysis and decided that it's financially better to screw over those customers than to spend money fixing it. But that's exactly the issue!

[-] victorz@lemmy.world 1 points 2 months ago

I mean... 🤷‍♂️ The analysis is made, decision made. I probably have an affected system but... What's the real risk for private end users? Should I really be so concerned?

[-] Grippler@feddit.dk 1 points 2 months ago

Should you really be concerned about a system that can be physically ruined by malware? I would say definitely yes...

[-] victorz@lemmy.world 1 points 2 months ago

I haven't had malware on any of my computers for 20+ years. 🤷‍♂️ Ever since I stopped clicking on shitty links on shitty sites and downloading shitty files with unknown contents and such behavior. I don't think I'm worried. I'm not the target group for these kinds of attacks, I think.

[-] Auli@lemmy.ca 1 points 2 months ago

Just because a store is still selling their stock doesn’t mean AND is still making them and selling them.

this post was submitted on 12 Aug 2024
525 points (100.0% liked)

Selfhosted

39677 readers
246 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS