A hot murphy: Graphics driver updates from GPU hardware manufacturers are typically met with good for you doses of excitement and skepticism. Some users wait forward to the potential game and application back up, functionality, or pure FPS a new package tin provide. Others are hesitant to accept the leap for fear that the release might cause more than problems than information technology solves. AMD's latest security bulletins have now shown the importance of keeping their Radeon drivers upwards-to-engagement in gild to support security posture too as graphics capabilities.

The latest batch of common vulnerabilities and exposures (CVEs) released by Team Cerise covers 27 driver-level security findings, including 18 high-severity vulnerabilities. Unintended escalation of privileges, DLL hijacking, and arbitrary code execution are among the bug caused by the security holes. Malicious actors taking advantage of these exploits tin cause user-facing impacts ranging from compromised information to consummate data loss.

Fortunately for AMD Radeon users, many of these issues have been addressed by the visitor's last several driver releases. Get-go with the Radeon 20.seven.1 and the Radeon 21.Q1 Enterprise driver packages, AMD has successfully mitigated most of these security issues, including all 18 high severity CVEs. These releases and their ability to remediate associated security concerns present an splendid case for end-users to review and consider commuter updates based on more than only efficient data and image processing by their GPUs.

Recently discovered security vulnerabilities are not limited to AMD'southward Radeon product line. The Register highlights more than than 70 vulnerabilities spanning all generations of AMD's EPYC processors and Intel's Wi-Fi, SSDs, and processors, including the Pentium, Celeron, Atom, and Xeon product lines.

The security issues were discovered and reported thanks to several researchers and organizations, including vulnerability expert Ori Nimron, cybersecurity product developer CyberArk Labs, and several others. Based on AMD's bulletins, any AMD GPU user running Radeon Software version 21.4.ane, Radeon Pro Software version 21.Q2 Enterprise driver, or higher, should be upward to engagement and protected from the reported exploits.