28 - 11 - 2024
Login Form



 


Share this post

Submit to FacebookSubmit to TwitterSubmit to LinkedIn

GIGABYTE TECHNOLOGY Co. Ltd, a leading manufacturer of motherboards, graphics cards, and hardware solutions, announced today the BIOS update that fixes a recently identified security vulnerability “Sinkclose” of AMD desktop processors.

This security flaw was reported to impact all AMD processors since 2006 and millions of devices globally. GIGABYTE remains working closely with AMD and demonstrates our commitment to swiftly addressing any issues that may affect our customers' experience. The latest AGESA BIOS which can fix the security vulnerability will be released to the website in succession starting by end of August.

User are encouraged to install the updated BIOS at their earliest convenience. The BIOS can be easily updated using GIGABYTE's @BIOS, Q-Flash, or Q-Flash Plus technology. Please refer to the following table for the AGESA BIOS version and applicable models.

 

Motherboard Models BIOS AGESA version
AM5 600 series AMD AGESA 1.2.0.1 for Ryzen 8000/ 7000-series Processors
AM4 500/ 400/ 300series

AMD AGESA 1.2.0.Cb for Ryzen 5000/ 5000G/ 4000G-series Processors

AMD AGESA 1.2.0.Cc for Ryzen 3000-series Processors

sTRX4 TRX40 series AMD AGESA 1.0.0.B for Ryzen Threadripper 3000-series Processors
sTR5 TRX50 series AMD AGESA 1.1.0.0f for Ryzen Threadripper PRO 7000/ Ryzen Threadripper 7000-series Processors

 

Please pay close attention to GIGABYTE’s website for the latest update and more information: https://www.gigabyte.com/Motherboard/AMD-Series

For more information about Sinkclose vulnerability, please refer to SMM Lock Bypass on AMD website.