Intel® Chipset Device Software Advisory, May 14, 2024
Description: A potential security vulnerability in some Intel® Chipset Device Software may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability.
1. Intel already provides libraries for the updated Kernel version to avoid this SA, suggest following the APOS list to do the validation.
Intel® Server Products UEFI Firmware Advisory, May 14, 2024
Description: Potential security vulnerabilities in some Intel® Server Products UEFI firmware may allow escalation of privilege or denial of service. Intel is releasing firmware updates to mitigate these potential vulnerabilities.
1. Intel Code:
FCP/DNP already merge the patch. BIOS:R01.02.0001
INTEL-SA-01080 –Intel® Server Products UEFI Firmware Advisory
CVE-2023-22662
CVE-2024-22095
CVE-2024-23980
CVE-2024-24981
CVE-2024-23487
CVE-2024-22382
INTEL-SA-01080
2024-05-14
Intel® TDX Module Software Advisory, May 14, 2024
Description: Potential security vulnerabilities in some Intel® Trust Domain Extensions (TDX) module software may allow escalation of privilege. Intel is releasing firmware updates to mitigate these potential vulnerabilities.
1. Intel Code:
FCP/DNP already merge the patch. (UPLR1 OOB) BIOS:9536D05
2. AMI Code:
For Eagle Stream Platform: 5.32_EagleStreamCrb_0ACOR_102
Intel® Ethernet Adapters and Intel® Ethernet Controller I225 Advisory, May 14, 2024
Description: Potential security vulnerabilities in some Intel® Ethernet Controller I225 Manageability firmware may allow escalation of privilege, denial of service or information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities.
1. Intel recommends updating the Intel® Ethernet Adapter toversion 29.0.1or later, suggest updating the latest FW to do the test.
INTEL-SA-00756 –Intel® Ethernet Adapters and Intel® Ethernet Controller I225 Advisory
CVE-2021-33146
CVE-2021-33142
CVE-2021-33158
CVE-2021-33145
CVE-2022-37341
CVE-2021-33161
CVE-2021-33157
CVE-2021-33162
CVE-2021-33141
INTEL-SA-00756
2024-05-14
Intel® DSA and Intel® IAA Advisory, June 28, 2024
Description: A potential security vulnerability in some Intel® Data Streaming Accelerator (Intel® DSA) and Intel® Analytics Accelerator (Intel® IAA) V1.0 for some Intel® 4th or 5th generation Xeon® processors may allow escalation of privilege. Intel is releasing prescriptive guidance and software updates to mitigate this potential vulnerability
1. Intel already provides the latest Intel® Chipset Device Software, suggest downloading the latest chipset to do the test.
INTEL-SA-01084 –Intel® DSA and Intel® IAA Advisory
CVE-2024-21823
INTEL-SA-01084
2024-03-18
Intel® Chipset Driver Software Advisory, March 18, 2024
Description: Potential security vulnerabilities in some Intel® Chipset Driver Software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities.
This is related with Intel Chipset Driver. The affacted products are FCP and DNP.
2024.1 IPU - Intel® Xeon® Processor Advisory, March 12, 2024
Description: A potential security vulnerability in some 3rd and 4th Generation Intel® Xeon® Processors when using Intel® Software Guard Extensions (SGX) or Intel® Trust Domain Extensions (TDX) may allow escalation of privilege. Intel is releasing firmware updates to mitigate this potential vulnerability.
1. Intel Code:
FCP/DNP already merge the patch. (PLR5) BIOS:R01.02.0001
CYP/TNP BIOS R01.01.0009 Next BIOS will fix.
2. AMI Code:
For Eagle Stream Platform: 5.32_EagleStreamCrb_0ACOR_098
March 12, 20242024.1 IPU - Intel® Processor Return Predictions Advisory, March 12, 2024
Description: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing a firmware update to mitigate this potential vulnerability.
1. Intel Code:
FCP/DNP already merge the patch. (PLR5) BIOS:R01.02.0001
CYP/TNP BIOS R01.01.0009 Next BIOS will fix.
2. AMI Code:
For Eagle Stream Platform: 5.32_EagleStreamCrb_0ACOR_098
Description: A potential security vulnerability in BIOS firmware for some Intel® Processors may allow escalation of privilege. Intel is releasing BIOS updates to mitigate this potential vulnerability.
1. Intel Code:
FCP/DNP already merge the patch. (PLR5) BIOS:R01.02.0001
CYP/TNP BIOS R01.01.0009 Next BIOS will fix.
2. AMI Code:
For Eagle Stream Platform: 5.32_EagleStreamCrb_0ACOR_098
This website uses essential and analytics cookies. You can choose your option by clicking "Accept All Cookies" or "Accept Essential Cookies" as Cookies Preferences.