Eighteen high severity vulnerabilities remediated in AMD’s Radeon graphics driver packages


A sizzling potato: Graphics driver updates from GPU {hardware} producers are sometimes met with wholesome doses of pleasure and skepticism. Some customers look ahead to the potential recreation and utility assist, performance, or pure FPS a brand new bundle can present. Others are hesitant to take the leap for worry that the discharge may trigger extra issues than it solves. AMD’s newest safety bulletins have now proven the significance of protecting their Radeon drivers up-to-date in an effort to assist safety posture in addition to graphics capabilities.

The most recent batch of widespread vulnerabilities and exposures (CVEs) launched by Workforce Crimson covers 27 driver-level safety findings, together with 18 high-severity vulnerabilities. Unintended escalation of privileges, DLL hijacking, and arbitrary code execution are among the many points brought on by the safety holes. Malicious actors profiting from these exploits may cause user-facing impacts starting from compromised info to finish information loss.

Thankfully for AMD Radeon customers, many of those points have been addressed by the corporate’s final a number of driver releases. Starting with the Radeon 20.7.1 and the Radeon 21.Q1 Enterprise driver packages, AMD has efficiently mitigated most of those safety points, together with all 18 excessive severity CVEs. These releases and their skill to remediate related safety issues current a wonderful case for end-users to assessment and take into account driver updates based mostly on extra than simply environment friendly information and picture processing by their GPUs.

Lately found safety vulnerabilities are usually not restricted to AMD’s Radeon product line. The Register highlights greater than 70 vulnerabilities spanning all generations of AMD’s EPYC processors and Intel’s Wi-Fi, SSDs, and processors, together with the Pentium, Celeron, Atom, and Xeon product traces.

The safety points had been found and reported because of a number of researchers and organizations, together with vulnerability knowledgeable Ori Nimron, cybersecurity product developer CyberArk Labs, and several other others. Based mostly on AMD’s bulletins, any AMD GPU person operating Radeon Software program model 21.4.1, Radeon Professional Software program model 21.Q2 Enterprise driver, or larger, needs to be updated and protected against the reported exploits.

Be the first to comment

Leave a Reply

Your email address will not be published.


*