On 9 November 2021 and 8 February 2022 Intel published several Security Advisories for various Intel products as part of the 2021.2 IPU (Intel Platform Update). Some of these security advisories require Firmware Updates . In this article you will find information about these Security Advisories as well as information where you will find updates for Thomas-Krenn products.
Security Advisories
Intel Security Advisory
Title
CVE
Affected systems
Further information
INTEL-SA-00470
2021.2 IPU - Intel Chipset Firmware Advisory
CVE-2021-0060 CVE-2021-33068 CVE-2021-0147
Intel C620A series chipset: SPS_E5_04.04.03.281.0 (or higher)
Intel C620 series chipset: SPS_E5_04.01.04.516.0, CSME 11.22.90 (or higher)
Intel C240 series chipset: SPS_E3_05.01.04.309.0 (or higher)
Intel Atom processor P5000 series: SPS_SoC-A_05.00.03.114.0 (or higher)
Intel Atom processor C3000 series: SPS_SoC-A_04.00.04.501.0 (or higher)
Intel C610 series chipset: SPS_PHI_03.01.03.078.0 (or higher)
Intel C610 series chipset: SPS_E5_03.01.03.116.0 (or higher)
Intel Xeon D processor 1500 series: SPS_SoC-X_03.00.03.117.0 (or higher)
Intel C620A series chipset: SPS_E5_04.04.04.033.0, SPS_E5_04.04.03.281.0 (or higher)
Intel C600 series chipset: SPS_02.04.00.101.0 (or higher)
Intel Xeon D processor 2000 series: SPS_SoC-X_04.00.04.326.0 (or higher)
Intel C624D chipset: ADAS_ME_ANL_01.00.05.004.0 (or higher)
Intel 500 series chipset, 11th Gen Intel Core processor, Pentium Gold processor series, Celeron processor 6000 series: CSME 15.0.35 (or higher)
Intel 500 series chipset, 11th Gen Intel Core processor, Intel Xeon W processor 1300 series: CSME 15.0.35 (or higher)
INTEL-SA-00527
2021.2 IPU - BIOS Advisory
CVE-2021-0091 CVE-2021-0092 CVE-2021-0093 CVE-2021-0099 CVE-2021-0103 CVE-2021-0107 CVE-2021-0111 CVE-2021-0114 CVE-2021-0115 CVE-2021-0116 CVE-2021-0117 CVE-2021-0118 CVE-2021-0119 CVE-2021-0124 CVE-2021-0125 CVE-2021-0156
2nd Generation Intel Xeon Scalable Processor Family
Intel Xeon Scalable Processor Family
Intel Xeon Processor W Family
Intel Xeon Processor E Family
Intel Xeon Processor D Family
11th Generation Intel Core Processor Family
10th Generation Intel Core Processor Family
9th Generation Intel Core Processor Family
8th Generation Intel Core Processor Family
7th Generation Intel Core Processor Family
6th Generation Intel Core processor Family
Intel Core X-series Processor Family
Intel Atom Processor C3XXX Family
INTEL-SA-00528
2021.2 IPU - Intel Processor Advisory
CVE-2021-0146
Intel Pentium Processor Silver Series, J Series, N Series, J&N Series, J&N Series Refresh
Intel Celeron Processor J Series, N Series
Intel Atom Processor A Series, E3900 Series
Intel Atom Processor C3000
INTEL-SA-00532
2021.2 IPU - Intel Processor Breakpoint Control Flow Advisory
CVE-2021-0127
3rd Generation Intel Xeon Scalable Processors
2nd Generation Intel Xeon Scalable Processors
10th Generation Intel Core Processor Family
9th Generation Intel Core Processor Family
8th Generation Intel Core Processor Family
7th Generation Intel Core Processor Family
6th Generation Intel Core Processors
Intel Celeron Processor G Series
Intel Core X-series Processors
Intel Pentium Gold Processor Series
Intel Xeon Scalable Processors
Intel Xeon Processor W Family
Intel Xeon Processor E Family
Intel Xeon Processor E3 v6 Family
Intel Xeon Processor E3 v5 Family
Intel Xeon Processor D Family
Intel Xeon Platinum 81xxD
INTEL-SA-00561
2021.2 IPU - Intel Processor Advisory
CVE-2021-0145
INTEL-SA-00562
2021.2 IPU - BIOS Reference Code Advisory
CVE-2021-0157 CVE-2021-0158
3rd Generation Intel Xeon Scalable Processors
Intel Xeon Processor E3 v6 Family
Intel Xeon Processor W Family
Intel Xeon Processor E Family
11th Generation Intel Core Processors
10th Generation Intel Core Processors
7th Generation Intel Core Processors
Intel Core X-series Processors
Intel Celeron Processor N Series
Intel Pentium Silver Processor Series
INTEL-SA-00589
2021.2 IPU - Intel Atom Processor Advisory
CVE-2021-33120
Updates for products from Thomas-Krenn
Information about updates will be published in the following Wiki article as soon as updates are available:
Author: Thomas Niedermeier
Thomas Niedermeier working in the product management team at Thomas-Krenn , completed his bachelor's degree in business informatics at the Deggendorf University of Applied Sciences. Since 2013 Thomas is employed at Thomas-Krenn and takes care of OPNsense firewalls, the Thomas-Krenn-Wiki and firmware security updates.