跳转到主要内容
Intel Platform Update (IPU) 2020.2, November 2020

More Information:

Security Advisories that affect BIOS:

  • INTEL-SA-00358 – 2020.2 IPU – BIOS Advisory
    • Summary: Potential security vulnerabilities in the BIOS firmware for some Intel® Processors may allow escalation of privilege or denial of service. Intel is releasing firmware updates to mitigate this potential vulnerability.
    • Severity: High
  • INTEL-SA-00391 – 2020.2 IPU – Intel® CSME, SPS, TXE, and AMT Advisory
    • Summary: Potential security vulnerabilities in Intel® Converged Security and Manageability Engine (CSME), Server Platform Services (SPS), Intel® Trusted Execution Engine (TXE), Intel® Dynamic Application Loader (DAL), Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM) and Intel® Dynamic Application Loader (Intel® DAL) may allow escalation of privilege, denial of service or information disclosure. Intel is releasing firmware and software updates to mitigate these potential vulnerabilities.
    • Severity: Critical
  • INTEL-SA-00389 – 2020.2 IPU - Intel® RAPL Advisory
    • Summary: Potential security vulnerabilities in the Intel® Running Average Power Limit (RAPL) Interface may allow information disclosure. Intel is releasing microcode and Linux driver updates to mitigate these potential vulnerabilities.
    • Severity: Medium
  • INTEL-SA-00390 – Intel BIOS Platform Sample Code Advisory
    • Summary: Potential security vulnerabilities in Intel BIOS platform sample code for some Intel® Processors may allow escalation of privilege. Intel is releasing BIOS platform sample code updates to mitigate these potential vulnerabilities.
    • Severity: High
  • Security Advisory that doesn’t affect BIOS:

    • Intel-SA-00381 – 2020.2 IPU - Intel® Processor Advisory