Security Advisories for Intel Products 2020-11-10 2020.2 IPU

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

On 10 November 2020 Intel published several Security Advisories for various Intel products as part of the 2020.2 IPU (Intel Platform Update). Some of these security advisories require Firmware Updates. In this article you will find information about these Security Advisories as well as information where you will find updates for Thomas-Krenn products.

Security Advisories

Intel Security Advisory Title CVE Affected systems Further information
INTEL-SA-00381

2020.2 IPU - Intel Processor Advisory

"Vector Register Leakage-Active" CVE-2020-8696
"Fast forward store predictor" CVE-2020-8698

  • 2nd Generation Intel Xeon Scalable Processors
  • Intel Xeon Scalable Processors
  • Intel Xeon Processor E Family
  • Intel Xeon Processor E3 v6 Family
  • Intel Xeon Processor E3 v5 Family
  • Intel Xeon Processor D Family
  • 6th, 7th, 8th, 9th, 10th and 11th Gen Core Processor
  • Intel Core X-series Processor
  • Intel Pentium Gold Processor Series
  • Intel Celeron Processor G Series
  • Intel Pentium Processor Family
INTEL-SA-00389

2020.2 IPU - Intel RAPL Advisory "PLATYPUS"

CVE-2020-8694
CVE-2020-8695

  • Intel Xeon Processor E Family
  • Intel Xeon Processor E3 v6 Family
  • Intel Xeon Processor E3 v5 Family
  • 6th, 7th, 8th, 9th and 10th Generation Intel Core Processor
  • Pentium Gold Processor Series
  • Intel Celeron Processor G Series
  • Intel Pentium Processor Silver Series
  • Intel Celeron Processor J Series
  • Intel Celeron Processor N Series
  • Intel Core X-series Processors
INTEL-SA-00391

CVE-2020-0528
CVE-2020-0529

CSME, ISM, AMT, DAL, DAL Software:
14.5.25 (or higher)
14.0.45 (or higher)
13.30.10 (or higher)
13.0.40 (or higher)
12.0.70 (or higher)
11.22.80 (or higher)
11.12.80 (or higher)
11.8.80 (or higher)
SPS:
E3_05.01.04.200 (or higher)
E5_04.01.04.400 (or higher)
E5_04.01.04.400 (or higher)
E3_04.01.04.200 (or higher)
SoC-X_04.00.04.200 (or higher)
SoCA_04.00.04.300 (or higher)
TXE:
4.0.30 (or higher)
3.1.80 (or higher)

Updates for products from Thomas-Krenn

Information about updates will be published in the following Wiki article as soon as updates are available:

Further information

Foto Thomas Niedermeier.jpg

Author: Thomas Niedermeier

Thomas Niedermeier working in the product management team at Thomas-Krenn, completed his bachelor's degree in business informatics at the Deggendorf University of Applied Sciences. Since 2013 Thomas is employed at Thomas-Krenn and takes care of OPNsense firewalls, the Thomas-Krenn-Wiki and firmware security updates.


Foto Werner Fischer.jpg

Author: Werner Fischer

Werner Fischer, working in the Knowledge Transfer team at Thomas-Krenn, completed his studies of Computer and Media Security at FH Hagenberg in Austria. He is a regular speaker at many conferences like LinuxTag, OSMC, OSDC, LinuxCon, and author for various IT magazines. In his spare time he enjoys playing the piano and training for a good result at the annual Linz marathon relay.


Related articles

INTEL-SA-00087 Safety Instructions for Intel SPI Flash
Optimize 3rd Gen Intel Xeon Scalable RAM Performance
Security Advisories for Intel Products 2020-06-09 2020.1 IPU