AMD Graphics Driver Vulnerabilities – February 2026

Summary

AMD received reports of vulnerabilities potentially affecting some AMD Graphics products. Refer to the CVE Details section for information about each CVE.

CVE Details

Refer to Glossary for explanation of terms

CVE

CVE Description

CVSS Score

CVE-2024-36324 Improper input validation in the AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary code execution. 8.8 High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

8.5 High
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVE-2024-36319 Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow an attacker to submit a maliciously crafted command causing the VCN FW to perform read/writes HW registers, potentially impacting confidentiality, integrity and availability of the system. 8.8 High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

6.3 Medium CVSS:4.0:AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H
CVE-2023-31323 Type confusion in the AMD Secure Processor (ASP) could allow an attacker to pass a malformed argument to the External Global Memory Interconnect Trusted Agent (XGMI TA), leading to a memory safety violation, potentially resulting in loss of confidentiality, integrity, or availability. 7.9 High
CVSS:3.1/ AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:L

8.4 High CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:LN
CVE-2025-48503 A DLL hijacking vulnerability in the AMD software installer could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution. 7.8 High
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

7.3 High CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVE-2025-48508 A DLL hijacking vulnerability in the AMD Cleanup Utility could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution. 7.3 High
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

7.0 High CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVE-2024-36320 Integer overflow within atihdwt6.sys can allow a local attacker to cause an out of bound read/write, potentially leading to loss of confidentiality, integrity and availability. 7.3 High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H

7.0 High CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
CVE-2025-48518 Improper input validation in AMD Graphics Driver could allow a local attacker to write out of bounds, potentially resulting in loss of integrity or denial of service. 7.3 High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H

6.9 Medium CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
CVE-2023-31313 An unintended proxy or intermediary in the AMD power management firmware (PMFW) could allow a privileged attacker to send malformed messages to the system management unit (SMU,) potentially resulting in arbitrary code execution. 7.2 High
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N

7.0 High CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVE-2023-20548 A time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability. 7.0 High
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L

CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
CVE-2023-31324 A time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to modify External Global Memory Interconnect Trusted Agent (XGMI TA) commands as they are processed, potentially resulting in loss of confidentiality, integrity, or availability. 7.0 High
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L

7.1 High CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
CVE-2021-26381 Improper system call parameter validation in the Trusted Operating System (TOS) may allow a malicious driver to perform mapping or un-mapping operations on a large number of pages, potentially resulting in kernel memory corruption. 6.4 Medium
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

7.1 High CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVE-2024-36316 The integer overflow vulnerability within AMD Graphics driver could allow an attacker to bypass size checks, potentially resulting in a denial of service. 5.5 Medium
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H  

6.8 Medium
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVE-2025-21940 (non-AMD) In the Linux® kernel, the following vulnerability has been resolved: drm/amdkfd: Fix NULL Pointer Dereference in KFD queue Through KFD IOCTL Fuzzing we encountered a NULL pointer derefrence when calling kfd_queue_acquire_buffers. (cherry picked from commit 049e5bf3c8406f87c3d8e1958e0a16804fa1d530) 5.5 Medium
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H  

*Linux Kernel did not provide CVSS4.0 score
CVE-2023-20601 Improper input validation within RAS TA Driver can allow a local attacker to access out-of-bounds memory, potentially resulting in a denial-of-service condition. 2.3 Low
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L  

4.6 Medium CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVE-2021-26410 Improper syscall input validation in AMD Secure Processor (ASP) may force the kernel into reading syscall parameter values from its own memory space, potentially allowing an attacker to infer the contents of the kernel memory, and potentially leading to information disclosure. 1.8 Low   CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

 

Affected Products and Mitigation

AMD recommends updating to the AMD graphics driver version (or later) indicated below. 

AMD Instinct™ Accelerators
Program CVE Mitigation Mitigation Release Date
AMD Instinct™ MI210
AMD Instinct™ MI250
CVE-2025-21940
(non-AMD)
ROCm 6.4.2 2025-07-21
CVE-2023-31313
CVE-2023-31324 ROCm 6.4 2025-04-11
CVE-2023-20548 ROCm 6.2 2024-08-02
CVE-2023-31323
AMD Instinct™ MI300A CVE-2025-21940
(non-AMD)
ROCm 6.4.2 2025-07-21
CVE-2023-31324 ROCm 6.4 2025-04-11
CVE-2024-36319 ROCm 6.2.4 2024-11-06
CVE-2023-31323 ROCm 6.2 2024-08-02
CVE-2023-20548
AMD Instinct™ MI300X CVE-2025-21940
(non-AMD)
ROCm 6.4.2 2025-07-21
CVE-2023-31324 ROCm 6.4 2025-04-11
CVE-2024-36319 ROCm 6.2.4 2024-11-06
CVE-2023-20548 ROCm 6.2 2024-08-02
CVE-2023-31323
AMD Instinct™ MI308X CVE-2024-36319 ROCm 6.2.4 2024-11-06
AMD Instinct™ MI325X CVE-2025-21940
(non-AMD)
ROCm 6.4.2 2025-07-21
CVE-2024-36319 ROCm 6.2.4 2024-11-06

Note: If you need support for MI100 products, contact your AMD Customer Engineering representative.

AMD Radeon™ PRO V Series Graphics Products
Program CVE Mitigation
AMD Radeon™ Instinct™ MI25 CVE-2025-48503 Contact your AMD Customer Engineering representative
AMD Radeon™ PRO V520 CVE-2021-26381 Contact your AMD Customer Engineering representative
CVE-2021-26410
CVE-2024-36316
CVE-2024-36324
CVE-2025-21940
(non-AMD)
CVE-2025-48503
AMD Radeon™ PRO V620 CVE-2021-26381 Contact your AMD Customer Engineering representative
CVE-2021-26410
CVE-2024-36316
CVE-2024-36324
CVE-2025-21940
(non-AMD)
CVE-2025-48503
AMD Radeon™ PRO V710 CVE-2024-36316 Contact your AMD Customer Engineering representative
CVE-2024-36319
CVE-2024-36324
CVE-2025-21940
(non-AMD)
CVE-2025-48503
CVE-2025-48508
CVE-2025-48518
AMD Radeon™ PRO Series Graphics Products
Program CVE Mitigation Mitigation Release Date
AMD Radeon™ PRO W5000 Series Graphics Products CVE-2021-26410 AMD Software: PRO Edition 25.Q2 (25.10.10) 2025-06-05
Radeon Software for Linux (25.10.1) 2025-06-05
CVE-2025-21940
(non-AMD)
Radeon™ Software for Linux® 25.10.2 2025-07-21
CVE-2021-26381 AMD Software: PRO Edition 25.Q2 (25.10.10) 2025-06-03
CVE-2023-20548
CVE-2023-31323
CVE-2023-31324
CVE-2024-36320
CVE-2024-36324
CVE-2025-48503 Auto Detect and Install 25.5.1 or later 2025-05-13
AMD Radeon™ PRO W6000 Series Graphics Products CVE-2021-26410 AMD Software: PRO Edition 25.Q2 (25.10.10) 2025-06-05
Radeon Software for Linux (25.10.1) 2025-06-05
CVE-2025-21940
(non-AMD)
Radeon™ Software for Linux® 25.10.2 2025-07-21
CVE-2021-26381 AMD Software: PRO Edition 25.Q2 (25.10.10) 2025-06-03
CVE-2024-36316
CVE-2024-36320
CVE-2024-36324
CVE-2025-48503 Auto Detect and Install 25.5.1 or later 2025-05-13
AMD Radeon™ PRO W7000 Series Graphics Products CVE-2025-21940
(non-AMD)
 Radeon™ Software for Linux® 25.10.2 2025-07-21
CVE-2024-36316 AMD Software: PRO Edition 25.Q2 (25.10.10) 2025-06-03
CVE-2024-36320 2025-06-03
CVE-2024-36324 2025-06-05
CVE-2025-48518 2025-06-05
CVE-2024-36319 AMD Software: PRO Edition 25.Q2 (25.10.10) 2025-06-03
Radeon Software for Linux 25.10.1 2025-06-03
CVE-2025-48503 Auto Detect and Install 25.5.1 or later 2025-05-13
AMD Radeon™ PRO WX 8000 Series Graphics Cards CVE-2024-36320 AMD Software: PRO Edition 25.Q2 (23.19.23.01 pre-RDNA) 2025-06-03
AMD Radeon™ PRO VII CVE-2024-36320 AMD Software: PRO Edition 25.Q2 (23.19.23.01 pre-RDNA) 2025-06-03
CVE-2023-20601
CVE-2023-31323 No planned fix*1 N/A
CVE-2023-20548 No planned fix*1 N/A

[1] Mitigation may introduce stability issues.

AMD Radeon™ Series Graphics Products
Program CVE Mitigation Mitigation Release Date
AMD Radeon™ RX 5000 Series Graphics Products CVE-2021-26410 AMD Software: PRO Edition 25.Q2 (25.10.10) 2025-06-05
Radeon Software for Linux (25.10.1) 2025-06-05
CVE-2025-21940
(non-AMD)
Radeon™ Software for Linux® 25.10.2 2025-07-21
CVE-2023-20548 AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01) 2025-06-05
CVE-2023-31323
CVE-2023-31324
CVE-2024-36324
CVE-2024-36320 AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09) 2025-06-03
CVE-2021-26381 AMD Software: Adrenalin Edition 25.4.1 (24.30.31.08) 2025-06-03
CVE-2025-48503 Auto Detect and Install 25.5.1 or later 2025-05-13
AMD Radeon™ RX 6000 Series Graphics Products CVE-2021-26410 AMD Software: PRO Edition 25.Q2 (25.10.10) 2025-06-05
Radeon Software for Linux (25.10.1) 2025-06-05
CVE-2025-21940
(non-AMD)
Radeon™ Software for Linux® 25.10.2 2025-07-21
CVE-2024-36324 AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01) 2025-06-05
CVE-2024-36316 AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09) 2025-06-03
CVE-2024-36320
CVE-2021-26381 AMD Software: Adrenalin Edition 25.4.1 (24.30.31.08) 2025-06-03
CVE-2025-48503 Auto Detect and Install 25.5.1 or later 2025-05-13
AMD Radeon™ RX 7000 Series Graphics Products CVE-2024-36324 AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01) 2025-06-05
CVE-2025-48518
CVE-2024-36316 AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09) 2025-06-03
CVE-2024-36320 2025-06-03
CVE-2024-36319 AMD Software: Adrenalin Edition 25.5.1 (25.10.01.09) 2025-06-03
Radeon Software for Linux 25.10.1 2025-06-03
CVE-2025-21940
(non-AMD)
Radeon™ Software for Linux® 25.10.2 2025-07-21
CVE-2025-48503 Auto Detect and Install 25.5.1 or later 2025-05-13
AMD Radeon™ RX 9000 Series Graphics Products   CVE-2024-36324 AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01) 2025-06-05
CVE-2025-48518
CVE-2025-21940
(non-AMD)
Radeon™ Software for Linux® 25.10.2 2025-07-21
CVE-2024-36320 AMD Software: Adrenalin Edition 25.5.1
(23.19.23.01 pre-RDNA)
2025-06-03
CVE-2025-48503 Auto Detect and Install 25.5.1 or later 2025-05-13
AMD Radeon™ AI PRO 9000 Series Graphics Products CVE-2025-21940
(non-AMD)
Radeon™ Software for Linux® 25.10.2 2025-07-21
AMD Radeon™ RX Vega Series Graphics Cards CVE-2024-36320 AMD Software: Adrenalin Edition 25.5.1
(23.19.23.01 pre-RDNA)
2025-06-03
AMD Radeon™ VII CVE-2024-36320 AMD Software: Adrenalin Edition 25.5.1
(23.19.23.01 pre-RDNA)
2025-06-03
CVE-2023-20601
CVE-2023-31323 No planned fix*1 N/A
CVE-2023-20548 No planned fix*1 N/A

[1] Mitigation may introduce stability issues.

Client Processors

The below Client processors include integrated graphics. To apply the recommended graphics mitigations for your AMD Client processor, locate the graphics architecture supported by your processor below and then refer to the table linked below for the mitigated version appropriate for your system.

AMD Athlon™ and AMD Ryzen™ Series Desktop Processors
Product Integrated AMD Radeon™ Graphics Mitigation
AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics AMD Radeon™ RX Vega Series AMD Software: Refer to the AMD PRO Series RadeonTM Graphics Products tables above for the mitigated version appropriate for your system.
AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics AMD Radeon™ RX Vega Series
AMD Radeon™ PRO VII Series
AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics AMD Radeon™ RX Vega Series
AMD Ryzen™ 7000 Series Desktop Processors AMD Radeon™ RX 6000 Series
AMD Ryzen™ 8000 Series Processors with Radeon™ Graphics AMD Radeon™ RX 7000 Series
AMD Radeon™ PRO W7000 Series
AMD Ryzen™ 9000 Series Desktop Processors AMD Radeon™ RX 6000 Series
AMD Athlon™ and AMD Ryzen™Mobile Processors
Product Integrated AMD Radeon™ Graphics Mitigation
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics AMD Radeon™ RX Vega Series AMD Software: Refer to the AMD RadeonTM Series Graphics Products tables above for the mitigated version appropriate for your system.  
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics AMD Radeon™ RX Vega Series
AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics AMD Radeon™ RX Vega Series
AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics AMD Radeon™ RX Vega Series
AMD Radeon™ PRO VII Cards
AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics AMD Radeon™ RX Vega Series
AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics AMD Radeon™ RX Vega Series
AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics AMD Radeon™ RX Vega Series
AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics AMD Radeon™ RX 6000 Series
AMD Radeon™ PRO W6000 Series
AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics AMD Radeon™ RX 6000 Series
AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics AMD Radeon™ RX Vega Series
AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics AMD Radeon™ RX 6000 Series
AMD Radeon™ PRO W6000 Series
AMD Ryzen™ 7040 Series Processors with Radeon™ Graphics AMD Radeon™ RX 7000 Series
AMD Radeon™ PRO W7000 Series
AMD Ryzen™ 7045 Series Mobile Processors   AMD Radeon™ RX 6000 Series
AMD Ryzen™ AI 300 Series Processor AMD Radeon™ RX 7000 Series
AMD Radeon™ PRO W7000 Series
AMD Ryzen™ AI Max 300 Series Processors AMD Radeon™ RX 7000 Series
AMD Radeon™ PRO W7000 Series
AMD Ryzen™ 9000HX Series Processors AMD Radeon™ RX 6000 Series
AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics AMD Radeon™ RX 7000 Series
AMD Radeon™ PRO W7000 Series
AMD Ryzen™ Z1 Series Processors AMD Radeon™ RX 7000 Series
AMD Ryzen™ Z2 Series Processors AMD Radeon™ RX 7000 Series
AMD Ryzen™ Z2 Series Processors AMD Radeon™ RX 6000 Series
AMD Ryzen™  Embedded Series Processors
Program CVE Mitigation Mitigation Release Date
AMD Ryzen™ Embedded 7000 Series Processors CVE-2024-36320 Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) 2025-07-31
CVE-2024-36319 Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) 2025-07-31
CVE-2024-36316 AMD Software: Adrenalin Edition 25.6.1/ AMD Software: PRO Edition 25.Q2 (25.10.10) 2025-07-31
CVE-2024-36324 Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) 2025-07-31
AMD Ryzen™ Embedded 8000 Series Processors CVE-2025-48518 AMD Software: Adrenalin Edition 25.6.1/ AMD Software: PRO Edition 25.Q2 (25.10.10) 2025-07-31
CVE-2024-36320 Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) 2025-07-31
CVE-2024-36319 Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) 2025-07-31
CVE-2024-36324 Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) 2025-07-31
CVE-2024-36316 AMD Software: Adrenalin Edition 25.6.1/ AMD Software: PRO Edition 25.Q2 (25.10.10) 2025-07-31
AMD Ryzen™ Embedded 9000 Series Processors CVE-2024-36320 Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) 2025-07-31
CVE-2024-36324 Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) 2025-07-31
CVE-2024-36319 Q2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926) 2025-07-31
AMD Ryzen™ Embedded R1000 Series Processors CVE-2024-36320 25Q3 AMD Emb [R1000 V1000] Win® Catalyst™ WHQL certified driver (71251) 2025-10-31
AMD Ryzen™ Embedded R2000 Series Processors CVE-2024-36320 Q2- 2025 AMD Embedded R2000, V2000 Windows® Catalyst™ WHQL certified driver (68914) 2025-07-31
AMD Ryzen™ Embedded V1000 Series Processors
(formerly codenamed "Raven Ridge")
CVE-2024-36320 25Q3 AMD Emb [R1000 V1000] Win® Catalyst™ WHQL certified driver (71251) 2025-10-31
AMD Ryzen™ Embedded V2000 Series Processors CVE-2024-36320 Q2- 2025 AMD Embedded R2000, V2000 Windows® Catalyst™ WHQL certified driver (68914) 2025-07-31

Acknowledgement 

AMD thanks the following researchers for participating in the AMD Bug Bounty Program: 

  • Daniel Jampen and Nicola Stauffer: CVE-2024-36324, CVE-2025-48518, CVE-2024-36316
  • Aobo Wang(@M4x_1997): CVE-2024-36320
  • Sandro Poppi: CVE-2025-48503

AMD thanks Microsoft for reporting this issue and engaging in coordinated vulnerability disclosure: CVE-2025-48508

Internally found: CVE-2021-26410, CVE-2024-36319, CVE-2023-20601, CVE-2021-26381, CVE-2023-31323, CVE-2023-31313, CVE-2023-20548, CVE-2023-31324 

Revisions

Revision Date Description
2026-02-10 Initial publication

DISCLAIMER

The information contained herein is for informational purposes only and is subject to change without notice. While every precaution has been taken in the preparation of this document, it may contain technical inaccuracies, omissions and typographical errors, and AMD is under no obligation to update or otherwise correct this information. Advanced Micro Devices, Inc. makes no representations or warranties with respect to the accuracy or completeness of the contents of this document, and assumes no liability of any kind, including the implied warranties of noninfringement, merchantability or fitness for particular purposes, with respect to the operation or use of AMD hardware, software or other products described herein. Any computer system has risks of security vulnerabilities that cannot be completely prevented or mitigated. No license, including implied or arising by estoppel, to any intellectual property rights is granted by this document. Terms and limitations applicable to the purchase or use of AMD’s products are as set forth in a signed agreement between the parties or in AMD's Standard Terms and Conditions of Sale.

AMD, the AMD Arrow logo, Instinct, Radeon, Ryzen, and combinations thereof are trademarks of Advanced Micro Devices, Inc. CVE and the CVE logo are registered trademarks of The MITRE Corporation. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. Other product names used in this publication are for identification purposes only and may be trademarks of their respective companies.

Third party content may be licensed to you directly by the third party that owns the content and is not licensed to you by AMD. ALL LINKED THIRD-PARTY CONTENT IS PROVIDED ‘AS IS’ WITHOUT A WARRANTY OF ANY KIND. USE OF SUCH THIRD-PARTY CONTENT IS DONE AT YOUR SOLE DISCRETION AND UNDER NO CIRCUMSTANCES WILL AMD BE LIABLE TO YOU FOR ANY THIRD PARTY CONTENT. YOU ASSUME ALL RISK AND ARE SOLELY RESPONSIBILITY FOR ANY DAMAGES THAT MAY ARISE FROM YOUR USE OF THIRD-PARTY CONTENT.

© 2026 Advanced Micro Devices, Inc. All rights reserved.