- ASUS recently released its Q-Release Slim function to GPUs
- The feature is reportedly harmful GPUs
- There is no current solution for this problem from ASUS
Asus’s Q-Release Slim was first revealed In August 2024 Under Gamescom. It is a 800-series broadcast feature and Intel Motherboards make graphics card removal much easier. However, the recently released feature reportedly causes larger headaches for buyers.
According to HXL and Andreas Schilling From Hardwareluxx (reported on Toms Hardware), Q-Release Slim has caused damage to graphics card by scraping the sides of the plug. This can potentially ruin your expensive graphics cards, including the recent RTX 5090.
Q-Release Slim is assumed to be an improved version of Q-Release, which was launched back in 2021 to advanced ASUS ROG Butter. It allows you to quickly eject cards by titling them as you pull upwards. However, the error lies in the PEG side of the PCIe slit on the motherboard, which has a metallic piece embedded in what scrapes against the plug. If the card is often pushed out, this can result in significant damage – some reviews and over -clockers tend to do.
Unikos hardware Offers more insight into the case, including more photos from the Bilibili channel. The first is of the design error that allegedly causes this problem, while two more are before and after the original card’s condition versus the harmful results of using Q-Reliece Slim Eject 60 times.
We have also reached ASUS on this question and will update this story with any statements from them.
This is also not the only problem that plagues asus
This is also not the only recent report on ASU’s motherboard. Patchnotes slid out earlythat revealed a beta bios fix for a “microcode signature verification vulnerability” that apparently affects the Asus Gaming Mothermoriard.
Tavis Ormandy, the security researcher who discovered the leak, said, “It looks like an oem leaked patch for a larger upcoming CPU vulnerability, ie ‘AMD microcode signature verification vulnerability.'” He then continues, “I’m not excited about this.
At the time the ASUS edited the patch notes to remove mention of AMD’s microcode problem, AMD had already confirmed the vulnerability of Registered. “AMD is aware of a newly reported processor vulnerability. Performing the attack requires both local access to administrator level to the system and the development and execution of malicious microcode,” the company said.
It seems that ASU’s motherboard has become involved in some serious problems, which can spell disaster for both processors and graphics cards. Hopefully the manufacturer can soon fix the problem as the timing could not be worse-with the release of the RTX 5000 series and new processors on the horizon.