Today AMD will release an updated driver for desktop Radeon video cards that closes the exploit we have seen in the last couple of weeks. While some folks have narrowly reported that ATI is susceptible to this flaw, it would seem that it impacts NVIDIA as well although we have yet to see any reaction from NVIDIA on this subject. So do not assume that you are safe from this exploit if you are running an NVIDIA based graphics card. NVIDIA has commented that it does know about the issue and is “digging in” since last week.
The market recently discovered a potential security vulnerability that could impact AMD’s Catalyst software package. After immediate investigation, AMD determined that a small section of code from one of the files in our installer package is potentially vulnerable. The AMD plan is to provide a new ATI Catalyst package no later than Monday, Aug. 13, 2007, that resolves this vulnerability. We strongly recommend that desktop ATI Radeon graphics users update to Catalyst version 7.8 once it is available on http://ati.amd.com/support/driver.html. AMD and Microsoft are also investigating additional distribution channels for this update. This vulnerability was not exclusive to AMD.
AMD, GPUs, Graphics Cards, Video Cards, Drivers, Radeon, Software