Customers accuse the chip maker of charging premium prices for a faulty product.
Video: Meltdown-Spectre attack variants discovered
Intel rival AMD is also facing a number of class-action lawsuits over how it’s responded to the Meltdown and Spectre CPU flaws.
As The Register reports, four class-action complaints have been filed against the chip maker seeking damages on behalf of customers and investors.
The suits follow a warning from AMD in late January thatwarned investors that it is “also subject to claims related to the recently disclosed side-channel exploits, such as Spectre and Meltdown, and may face claims or litigation for future vulnerabilities”.
Intel revealed last week that it now faced 32 class-action lawsuits over its handling of the Meltdown and Spectre issues and three additional lawsuits over alleged insider trading.
AMD chips aren’t affected by the Meltdown attack but, like Arm and Intel, its processors have the same design flaws in its use of speculative execution that enable the Spectre attacks.
Three of the four cases represent customers who’d bought AMD processors. The complaints note that AMD continued to market its processors as high-performance chips despite knowing that this level of performance was unattainable without exposing users to the Spectre attack, and that mitigations would slow down performance.
With so many data protection providers competing for your business, how do you determine which is the right one for you? Download our helpful selection guide for a clear step-by-step process that will help you choose a data protection provider with confidence.
“Plaintiff and members of the Class would not have purchased or leased — or would have paid substantially less for — AMD processors (or devices containing AMD processors) had they known of the Spectre defect and the reduction in processing performance associated with efforts necessary to mitigate the substantial security risks presented by the Spectre defect,” reads one complaint.
The shareholder complaint seeks damages on behalf of anyone who bought AMD shares in the year leading to January 11, 2018, the date AMD admitted its processors were vulnerable to both variants of the Spectre attacks and its share price fell by 0.99 percent. Following the first media reports of the flaws AMD suggested it wasn’t vulnerable at all.
Another of the customer complaints calls out AMD’s marketing for the high-performance Rizen Threadripper 1950X and 1920 processors which were launched in July and August 2017.
AMD said they delivered “uncompromising performance”. Google’s Project Zero researcher Jan Horn is said to have told AMD about the flaws in early June 2017.
“Despite its knowledge of the Spectre Defect, AMD continued to sell its processors to unknowing customers at prices much higher than what customers would have paid had they known about the Spectre Defect and its threat to critical security features as well as on the processing speeds of the devices they purchased,” the complaint reads.
PREVIOUS AND RELATED COVERAGE
Intel makes progress on reissuing stable microcode updates against the Spectre attack.
Intel faces 32 class action lawsuits over its processor flaws and says more may be in the pipeline.
Intel and AMD may need to revisit their microcode fixes for Meltdown and Spectre.
The performance impact of Meltdown patches makes it essential to move systems to Linux 4.14.
And offers patching tips from US CERT, which it failed to brief on the bugs.
Malware makers are experimenting with malware that exploits the Spectre and Meltdown CPU bugs.
The out-of-band update disabled Intel’s mitigation for the Spectre Variant 2 attack, which Microsoft says can cause data loss on top of unexpected reboots.
Great work on patching your own products, but why were smaller tech companies kept in the dark?
Dell and HP have pulled Intel’s firmware patches for the Spectre attack.
AMD PCs can now install Microsoft’s Windows update with fixes for Meltdown and Spectre and the bug that caused boot problems.
Intel’s firmware fix for Spectre is also causing higher reboots on Kaby Lake and Skylake CPUs.
Roughly a week after the update was released, many machines still lack the fix for the critical CPU vulnerabilities.
Our devices may never truly be secure, says the CEO of the company that designs the heart of most mobile chips.