@bug
CTSLabs has still been unable to demonstrate the quote "13 Critical Security Vulnerabilities and Manufacturer Backdoors discovered throughout AMD Ryzen & EPYC product lines" and quote "Any consumer or organization purchasing AMD Servers, Workstations, or Laptops are affected by these vulnerabilities" and quote "
How long before a fix is available? - We don't know. CTS has been in touch with industry experts to try and answer this question. According to experts, firmware vulnerabilities such as MASTERKEY, RYZENFALL and FALLOUT take several months to fix. Hardware vulnerabilities such as CHIMERA cannot be fixed and require a workaround. Producing a workaround may be difficult and cause undesired side-effects." (
https://amdflaws.com/)
They paid trailofbits for analysis which they've ignored aswell as ignoring suggestion to disclose them via CERT, industry experts disagree with their impact assessment.
https://blog.trailofbits.com/2018/03/15/amd-flaws-technical-summary/
The information leaked to stock shortseller Viceroy who were the first to capitalize on this, unsuccessfully since they are a bunch of amateurs, as found in #426.
Based on all this CTSLabs is a bunch of amateurs paddling some vulnerabilities which they were hoping to make some dirty money out of, instead of reporting issues as per industry agreed procedures to resolve the problems.
Based on that graph, you have been doing much of the orange, yellow and green. You've seemingly avoided the red and haven't touched the blue, violet and gray. Just based on observations.
Come again? For every detail i've shared along with my opinion about this I've added links and reasoning. Can't do much more in a forum thread, unfortunately. Something that cant be said about you, though.