- Asus lately launched its Q-Launch Slim characteristic for GPUs
- Mentioned characteristic is reportedly damaging GPUs
- There is no present repair for this subject from Asus
Asus’s Q-Launch Slim was first revealed in August 2024 throughout Gamescom. It’s an eject characteristic on 800-series AMD and Intel motherboards that makes eradicating graphics playing cards a lot simpler. Nevertheless, the lately launched characteristic is reportedly inflicting main complications for patrons.
In line with HXL and Andreas Schilling from HardwareLuxx (reported on by Tom’s {Hardware}), Q-Launch Slim has been inflicting harm to graphics playing cards by scraping off the perimeters of the connector. This might probably spoil your costly graphics playing cards, together with the current RTX 5090.
The Q-Launch Slim is meant to be an improved model of the Q-Launch launched again in 2021 for high-end Asus ROG motherboards. It permits you to rapidly eject playing cards by titling them whereas pulling upwards. Nevertheless, the fault lies within the peg aspect of the PCIe slot on the motherboard, which has a metallic piece embedded in it that scrapes towards the connector. If the cardboard is ejected often, this may end up in important harm — one thing critiques and overclockers are likely to do.
Uniko’s {Hardware} presents extra perception into the matter, together with a number of photographs from the bilibili channel. The primary is of the design flaw reportedly inflicting this subject, whereas two extra are earlier than and after the unique card’s situation versus the damaging outcomes of utilizing the Q-Launch Slim eject 60 instances.
We’ve additionally reached out to Asus regarding this subject and can replace this story with any statements from them.
This isn’t the one subject plaguing Asus both
This isn’t the one current report regarding Asus motherboards both. Patch notes slipped out early, which revealed a BETA bios repair for a “microcode signature verification vulnerability,” apparently affecting Asus gaming motherboards.
Tavis Ormandy, the safety researcher who noticed the leak, said, “It appears like an OEM leaked the patch for a significant upcoming CPU vulnerability, ie: ‘AMD Microcode Signature Verification Vulnerability.’” He then continues, “I am not thrilled about this. The patch isn’t at the moment in Linux firmware, so that is the one publicly accessible patch.”
By the point Asus edited the patch notes to take away mentioning AMD’s microcode subject, AMD had already confirmed the vulnerability to The Register. “AMD is conscious of a newly reported processor vulnerability. Execution of the assault requires each native administrator-level entry to the system, and improvement and execution of malicious microcode,” the corporate said.
Evidently Asus motherboards have been embroiled in some severe hassle, which might spell catastrophe for each processors and graphics playing cards. Hopefully, the producer can appropriate the difficulty quickly, because the timing couldn’t be worse — with the discharge of the RTX 5000-series and new processors on the horizon.