AMD graphics driver quietly fixes four major security vulnerabilities - WritenAreGiven

WritenAreGiven

Technology: Latest News,Review & Leaks

AMD graphics driver quietly fixes four major security vulnerabilities

Share This
If you don't like upgrading the graphics card driver, here is a good reason for you. In the recently released Adrenalin 20.1.1 driver, AMD quietly fixed four major security vulnerabilities, and the official did not publicly explain them.
AMD graphics driver quietly fixes four major security vulnerabilities

Talos Intelligence, a Cisco company known as the world's largest security intelligence centre, reports that the four vulnerabilities are numbered CVE-2019-5124, CVE-2019-5146, CVE-2019-5147, and CVE-2019-5183, all of which involve AMD graphics card driver dynamic link library file ATIDXX64.dll and shader compiler function.


Among them, the first three vulnerabilities are similar and can be caused by using maliciously constructed shader code, which can cause graphics card drivers to crash and DoS denial of service attacks. When using the virtual machine environment to test, the virtual machine software also crashed.

The fourth vulnerability is even more serious. Using specially crafted shader code can cause remote code execution and lose control of the system.

The above vulnerabilities have been tested and confirmed in the RX 550 series graphics card, VMware Workstation 15.5.0 software, and Windows 10 x64 system environment. The security personnel believe that all AMD DX12 graphics cards should exist.

AMD has fixed the above vulnerabilities in the latest 20.1.1 and 20.1.2 drivers. It is strongly recommended that AMD graphics card users upgrade as soon as possible.

In addition, the version 20.1.2 driver also supports the latest Vulkan 1.2 API standard specifications, and is optimized for "Dragon Ball Z: Carkarot".

1 comment:

Like a Reply

Post Bottom Ad