Feeds

Data-corruption bug hits VIA chipsets

Only obscure (ish) configs need apply

  • alert
  • submit to reddit

Updated VIA has confirmed a data-damaging glitch in its 686B Southbridge chip - a major part of the Taiwanese company's KT-133A chipset - and is working with mobo makers to prepare BIOS updates to fix the problem.

The southbridge part is used in the vast majority of AMD Athlon-oriented mobos, primarily the KT-133, but it can be used with northbridge parts from the Apollo Pro 133, KX-133A and AMD-76x chipsets too. VIA said it is investigating the problem to see how many chipsets are affected.

The bug was uncovered by German hardware site Au-Ja! It's not exactly a common problem: the date corruption affects large, 100MB and up file transfers between two hard drives connected to separate IDE channels exchanging the data by DMA. Having a Creative Labs Soundblaster Live card in place seems to exacerbate the problem.

VIA's BIOS fix works by adjusting a number of PCI settings, which, according to Tecchannel, suggests the problem is a result of competitive PCI access.

VIA told The Register that it is a BIOS issue, and it will be posting a fix on its Web site sometime next week. ®

Related Links

Au-Ja's initial report (in German)
Tecchannel's summary (in German)

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.