Security Advisories for Intel Products 2021-06-08 2021.1 IPU

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On 8 June 2021 Intel published several Security Advisories for various Intel products as part of the 2021.1 IPU (Intel Platform Update). Some of these security advisories require Firmware Updates. In this article you will find information about these Security Advisories as well as information where you will find updates for Thomas-Krenn products.

Security Advisories

Intel Security Advisory Title CVE Affected systems Further information
INTEL-SA-00442

2021.1 IPU - Intel VT-d Advisory

CVE-2020-24489

  • 11th Generation Intel Core Processors
  • 10th Generation Intel Core Processors
  • Intel Pentium Processor J Series
  • Intel Pentium Processor N Series
  • Intel Celeron Processor J Series
  • Intel Celeron Processor N Series
  • Intel Atom Processor A Series
  • Intel Atom Processor E3900 Series
  • Intel Pentium Processor Silver Series/J&N Series
  • Intel Pentium Processor Silver Series/J&N Series Refresh
  • Intel Core Processors with Intel Hybrid Technology
INTEL-SA-00459

2021.1 IPU - Intel CSME, SPS and LMS Advisory

CVE-2020-8703
CVE-2020-8704
CVE-2020-24506
CVE-2020-24507
CVE-2020-24509
CVE-2020-24516

CSME, ISM, AMT, DAL, DAL Software:
15.0.22 (or higher)
14.5.32 (or higher)
14.1.53 (or higher)
13.50.11 (or higher)
13.30.17 (or higher)
13.0.47 (or higher)
12.0.81 (or higher)
11.22.86 (or higher)
11.12.86 (or higher)
11.8.86 (or higher)
SPS:
SPS_E3_05.01.04.300.0 (or higher)
SPS_SoC-A_05.00.03.091.0 (or higher)
SPS_E5_04.04.04.023.0 (or higher)
SPS_E5_04.04.03.263.0 (or higher)
LMS:
2039.1.0.0 (or higher)
INTEL-SA-00463

2021.1 IPU – BIOS Advisory

CVE-2020-8670
CVE-2020-8700
CVE-2020-12357
CVE-2020-12358
CVE-2020-12359
CVE-2020-12360
CVE-2020-24486
CVE-2021-0095

  • 2nd Generation Intel Xeon Scalable Processors
  • Intel Xeon Scalable Processors
  • 11th Generation Intel Core Processors
  • 10th Generation Intel Core Processors
  • Intel Core Processors with Intel Hybrid Technology
  • 8th Generation Intel Core Processors
  • 7th Generation Intel Core Processors
  • 6th Generation Intel Core Processors
  • Intel Xeon Processor E7 v4 Family
  • Intel Xeon Processor E5 v4 Family
  • Intel Xeon Processor E5 v3 Family
  • Intel Xeon Processor E3 v6 Family
  • Intel Xeon Processor E3 v5 Family
  • Intel Xeon Processor W Family
  • Intel Xeon Processor E Family
  • Intel Xeon Processor D Family
  • Intel Core X-series Processors
INTEL-SA-00464

2021.1 IPU - Intel Processor Advisory

CVE-2020-24511
CVE-2020-24512

  • Affected Processors: Transient Execution Attacks & Related Security Issues by CPU
  • 11th Generation Intel Core Processor Family
  • 10th Generation Intel Core Processor Family
  • 9th Generation Intel Core Processor Family
  • 8th Generation Intel Core Processor Family
  • 7th Generation Intel Core Processor Family
  • 6th Generation Intel Core Processors
  • Intel Xeon Processor E3 v6 Family
  • Intel Xeon Processor E3 v5 Family
  • Intel Xeon Processor E Family
  • Intel Xeon W Processor Family
  • Intel Pentium Gold Processor Series
  • Intel Celeron Processor 5000 Series
  • Intel Pentium Processor Series
  • Intel Core X-series Processors
INTEL-SA-00465

2021.1 IPU - Intel Atom Processor Advisory

CVE-2020-24513

  • Affected Processors: Transient Execution Attacks & Related Security Issues by CPU
  • Intel Pentium Processor J Series
  • Intel Pentium Processor N Series
  • Intel Celeron Processor J Series
  • Intel Celeron Processor N Series
  • Intel Atom Processor A Series
  • Intel Atom Processor E3900 Series
  • Intel Atom Processor C Series
  • Intel Pentium Processor Silver Series
  • Intel Celeron Processor J Series
  • Intel Celeron Processor N Series

Updates for products from Thomas-Krenn

Information about updates will be published in the following Wiki article as soon as updates are available:

Further information

Foto Thomas Niedermeier.jpg

Author: Thomas Niedermeier

Thomas Niedermeier working in the product management team at Thomas-Krenn, completed his bachelor's degree in business informatics at the Deggendorf University of Applied Sciences. Since 2013 Thomas is employed at Thomas-Krenn and takes care of OPNsense firewalls, the Thomas-Krenn-Wiki and firmware security updates.


Related articles

Processor P-states and C-states
Safety Instructions for Spectre-NG (Spectre Next Generation)
Security Advisories for Intel Products 2021-02-09