BIOS security updates LGA 1155 - Intel Core processors 2nd and 3rd generation
Please note that this article / this category refers either on older software / hardware components or is no longer maintained for other reasons. This page is no longer updated and is purely for reference purposes still here in the archive available. |
---|
The following table shows available UEFI firmware/BIOS security updates for LGA 1155 (Sandy Bridge & Ivy Bridge) motherboards from Thomas-Krenn. In the columns of the table security flaws are listed, which require UEFI firmware/BIOS updates. For each mainboard it is noted whether an update is already available for the respective vulnerability. Information about other mainboards can be found in the article BIOS security updates.
In the case of security flaws that affect the CPU microcode (e.g. Spectre or L1TF), the microcode can in many cases also be applied alternatively via the operating system.
LGA 1155 - 2nd & 3rd Gen
- Processors: Sandy Bridge (2nd Generation Intel Core Processor Family) / Ivy Bridge (3rd Generation Intel Core Processor Family)
Security update | 2020.1 IPU INTEL-SA-00295 INTEL-SA-00320 INTEL-SA-00322 |
2020-01 INTEL-SA-00329 |
2019-12 INTEL-SA-00289 INTEL-SA-00317 |
2019.2 IPU INTEL-SA-00220 INTEL-SA-00241 INTEL-SA-00254 INTEL-SA-00270 |
2019.1 QSR INTEL-SA-00213 INTEL-SA-00223 Microarchitectural Data Sampling - ZombieLoad INTEL-SA-00233 |
2018.4 QSR INTEL-SA-00185 INTEL-SA-00191 |
Intel ME, CSME, SPS und TXE INTEL-SA-00125 INTEL-SA-00141 INTEL-SA-00142 |
Spectre V3a and V4, Foreshadow L1 Terminal Fault INTEL-SA-00115 INTEL-SA-00161 |
Spectre Variant 2 INTEL-SA-00088 |
---|---|---|---|---|---|---|---|---|---|
Update Microcode | yes | yes | yes | yes | yes | - | - | yes | yes |
Update SPS | yes | - | - | yes | yes | yes SPS >= 4.00.04.383 SPS >=4.01.02.174 |
yes | - | - |
Update Platform Sample / Silicon Reference firmware | under investigation | - | - | yes | under investigation | yes | - | - | - |
Update BIOS ACM firmware / SINIT ACM firmware | under investigation | - | - | yes | ? | ? | ? | ? | ? |
Supermicro X9SCA-F | not affected | Microcode update via OS recommended, no ME/SPS/TXT support from Intel[1] | not affected | not affected | BIOS 2.3 (available on request) | BIOS 2.3 (available on request) | |||
Supermicro X9SCD-F | not affected | not affected | not affected | BIOS 2.3 (available on request) | BIOS 2.3 (available on request) | ||||
Supermicro X9SCM-F | not affected | not affected | not affected | BIOS 2.3 |
References
- ↑ INTEL-SA-00213 Intel CSME, Intel SPS, Intel TXE, Intel DAL, and Intel AMT 2019.1 QSR Advisory (www.intel.com) Note: Firmware versions of Intel® ME 3.x thru 10.x, Intel® TXE 1.x thru 2.x and Intel® Server Platform Services 1.x thru 2.X are no longer supported, thus were not assessed for the vulnerabilities/CVEs listed in this Technical Advisory. There is no new release planned for these versions.
Author: Thomas Niedermeier Thomas Niedermeier working in the product management team at Thomas-Krenn, completed his bachelor's degree in business informatics at the Deggendorf University of Applied Sciences. Since 2013 Thomas is employed at Thomas-Krenn and takes care of OPNsense firewalls, the Thomas-Krenn-Wiki and firmware security updates.
|
Author: Werner Fischer Werner Fischer, working in the Knowledge Transfer team at Thomas-Krenn, completed his studies of Computer and Media Security at FH Hagenberg in Austria. He is a regular speaker at many conferences like LinuxTag, OSMC, OSDC, LinuxCon, and author for various IT magazines. In his spare time he enjoys playing the piano and training for a good result at the annual Linz marathon relay.
|