移至主內容
Intel Platform Update (IPU) Update 2024.3, August 2024

More Information:

Security Advisories that affect BIOS:

  • INTEL-SA-01038 – 2024.2 IPU - Intel® Core™ Ultra Processor Stream Cache Advisory
    • Summary: A potential security vulnerability in the Intel® Core™ Ultra Processor stream cache mechanism may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability.
    • Severity: High
  • INTEL-SA-01046 – 2024.2 IPU - Intel® Processor Stream Cache Advisory
    • Summary: A potential security vulnerability in some Intel® Processor stream cache mechanisms may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability.
    • Severity: High
  • INTEL-SA-00999 – 2024.3 IPU - Intel® Chipset Firmware Advisory
    • Summary: Potential security vulnerabilities in Intel® Converged Security and Manageability Engine (CSME), Intel® Active Management Technology (AMT), Intel® Standard Manageability, Intel® PROSet/Wireless and Intel® Killer™ Wi-Fi software may allow escalation of privilege, denial of service, or information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities.
    • Severity: Medium
  • INTEL-SA-01083 – 2024.3 IPU - SMI Transfer Monitor Advisory
    • Summary: A potential security vulnerability in SMI Transfer monitor (STM) may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability.
    • Severity: High
  • INTEL-SA-01100 – 2024.3 IPU - Intel® Xeon® Processor Advisory
    • Summary: A potential security vulnerability in some 3rd, 4th, and 5th Generation Intel® Xeon® Processors may allow escalation of privilege. Intel is releasing firmware updates to mitigate this potential vulnerability.
    • Severity: Medium
  • INTEL-SA-01118 – 2024.3 IPU - 3rd Generation Intel® Xeon® Scalable Processor Advisory
    • Summary: A potential security vulnerability in some 3rd Generation Intel® Xeon® Scalable Processors may allow denial of service. Intel is releasing microcode updates to mitigate this potential vulnerability.
    • Severity: Medium
  • INTEL-SA-01103 – 2024.3 IPU - Intel® Processor RAPL Interface Advisory
    • Summary: A potential security vulnerability in the Running Average Power Limit (RAPL) interface for some Intel® Processors may allow information disclosure. Intel is releasing firmware updates to mitigate this potential vulnerability.
    • Severity: Medium

Addendum to INTEL-SA-01103

Advisory Overview

Security Vulnerability in Intel RAPL Interface (CVE-2024-23984) – Supermicro has been made aware of a potential security vulnerability affecting Intel processors, identified as CVE-2024-23984. This vulnerability resides in the Running Average Power Limit (RAPL) interface, which may allow an authenticated local user to escalate privileges or disclose sensitive information by reading energy usage data.

Affected Products

This issue impacts Supermicro motherboards powered by certain Intel Xeon® processors across the X12 and X13 product families. Supermicro has collaborated with Intel to provide mitigation strategies to address this vulnerability.

Mitigation and Workarounds

After a detailed investigation we confirmed that mitigation for this issue requires both the 2024.3 IPU and the relevant Linux OS patch: Running Average Power Limit Energy Reporting

  1. Apply OS Linux patch to the Linux systems
  2. Apply microcode patch to all systems with Intel SGX enabled

Affected Platforms and BIOS version numbers that contain the fix:

X13-CatlowBIOS version that contains the fix
X13SCL-IFv 2.0
X13SCL-Fv 2.0
X13SCHv 2.0
X13SCD-Fv 2.0
X13SCWv 2.0
B4SC1v 2.0
X12-Cedar IslandBIOS version that contains the fix
X12QCH+v 2.0
X13-Eagle StreamBIOS version that contains the fix
X13DEHv 2.4
X13DEG-OADv 2.4
X13DEG-OAv 2.4
X13DGUv 2.4
X13QEH+v 2.4
X13DAi-Tv 2.4
X13DDWv 2.4
B13DEEv 2.4
B13DETv 2.4
B13SEE-CPU-25Gv 2.4
B13SEGv 2.4
X13DEG-Mv 2.4
X13DEG-QTv 2.4
X13DEG-Rv 2.4
X13DEG-PVCv 2.4
X13DEi(-T)v 2.4
X13DEMv 2.4
X13DET-Bv 2.4
X13DSF-Av 2.4
X13SEDW-Fv 2.4
X13SEED-F/SFv 2.4
X13SEFR-Av 2.4
X13SEI-TF/-Fv 2.4
X13SEM-TFv 2.4
X13SET-G/-GCv 2.4
X13SET-PTv 2.4
X13SEVR-SP13Fv 2.4
X13SEWv 2.4
X13SEW-TF-OS1v 2.4
X13OEiv 2.4
X11-Greenlow refresh ServerBIOS version that contains the fix
X11SSD-Fv 3.4
X11SSH-(C)TFv 3.4
X11SSH-(LN4)Fv 3.4
X11SSL(-F)v 3.4
X11SSL-C/nFv 3.4
X11SSM(-F)v 3.4
X11SSW-(4)TFv 3.4
X11SSW-Fv 3.4
X11SSA-F/X11SSi-LN4Fv 3.4
X11SSE-Fv 3.4
X11SSH-G(T)F-1585(L)v 3.4
X11SSV-M4Fv 3.4
B2SS2-Fv 3.4
B2SS2-CPU/-(C)Fv 3.4
B2SS1/2(-H)-MTFv 3.4
X12-IdavilleBIOS version that contains the fix
X12SDV-SPT4Fv 1.8
X12SDV-SP6Fv 1.8
X12SDV-SPT8Fv 1.8
B3SD1v 1.8
X11-Mehlow ServerBIOS version that contains the fix
X11SCWv 2.5
X11SCDv 2.5
X11SCMv 2.5
X11SCL-LN4Fv 2.5
X11SCEv 2.5
X11SCHv 2.5
X11SCL-Fv 2.5
X11SCLv 2.5
X11-Mehlow WorkstationBIOS version that contains the fix
X11SCA-Fv 2.6
X11SCQ/Lv 2.6
X11SCV-Q/Lv 2.6
X11SCZ-F/Qv 2.6
B2SC1v 2.6
B2SC2v 2.6
B11SCG-CTFv 2.6
B11SCG-ZTFv 2.6
X13-Raptor LakeBIOS version that contains the fix
X13SRN-H/-E/-WOHSv 3.3
X12-TatlowBIOS version that contains the fix
X12STWv 2.1
X12STHv 2.1
X12STDv 2.1
X12STEv 2.1
X12STL-IFv 2.1
X12STL-Fv 2.1
B3ST1v 2.1
X12-Tiger LakeBIOS version that contains the fix
X12STNv 1.8
X11-Whiskey LakeBIOS version that contains the fix
X11SWNv 2.1
X12-WhitleyBIOS version that contains the fix
B12DPE-6v 2.1
B12DPT-6v 2.1
B12SPE-CPUv 2.1
X12DAi-N6v 2.1
X12DGO-6v 2.1
X12DGQ-Rv 2.1
X12DPG-ARv 2.1
X12DPG-OA6v 2.1
X12DPG-OA6-GD2v 2.1
X12DPG-QRv 2.1
X12DPG-QBT6v 2.1
X12DPG-QT6v 2.1
X12DPG-U6v 2.1
X12DPi-N(T)6v 2.1
X12DPL-i6/NT6v 2.1
X12DDW-A6v 2.1
X12DGUv 2.1
X12DHM-6v 2.1
X12DPD-A/AM25v 2.1
X12DPFR-AN6v 2.1
X12DPT-B6v 2.1
X12DPT-PT6/-PT46v 2.1
X12DPU-6v 2.1
X12DSC-6v 2.1
X12DSC-A6v 2.1
X12SPO-(NT)Fv 2.1
X12SPM Seriesv 2.1
X12SPW-(T)F, X12SPW-(T)Fv 2.1
X12SPL-LN4Fv 2.1
X12SPZ-SPLN6F/LN4Fv 2.1
X12SPi-TFv 2.1
X12SPA-TFv 2.1
X12SPED-Fv 2.1
X12SPG-NFv 2.1
X12SPT-PTv 2.1
X12SPT-Gv 2.1
X12DPiv 2.1
X11-Purley RefreshBIOS version that contains the fix
X11SPi-TFv 4.4
X11SPG-TFv 4.4
X11SPH-nCT(P)Fv 4.4
X11SPL-Fv 4.4
X11SPM-(T)F/TPFv 4.4
X11SPW-(C)TFv 4.4
X11DPi-N/NT/Niv 4.4
X11DAi-Nv 4.4
X11DGQ-Rv 4.4
X11DPG-HGX2v 4.4
X11DPG-OTv 4.4
X11DPS-REv 4.4
X11DACv 4.4
X11DGOv 4.4
X11QPH+v 4.4
X11QPLv 4.4
X11OPiv 4.4
B11DPTv 4.4
B11DPEv 4.4
B11QPI/-Tv 4.4
X11DPD-L/M25v 4.4
X11DPG-QT (32MB)v 4.4
X11DPG-QT (64MB)v 4.4
X11DPL-iv 4.4
X11DPUv 4.4
X11DPU-Vv 4.4
X11DPU-Rv 4.4
X11DPX-Tv 4.4
X11DSC+v 4.4
X11DDW-L/N(T)v 4.4
X11DPFF-SNv 4.4
X11DPFR-S(N)v 4.4
X11DPH-T(Q)(F)v 4.4
X11DPT-Bv 4.4
X11DPT-PSv 4.4
X11DPU-Z+v 4.4
B11SPEv 4.4
X13-Alder LakeBIOS version that contains the fix
B4SA1-CPUv 3.3
X13SAEv 3.3
X13SAE-Fv 3.3
X13SAN-H/-E/-L/-Cv 3.3
X13SAQv 3.3
X13SAV-LVDSv 3.3
X13SAV-PSv 3.3
X13SAZ-Fv 3.3
X13SAZ-Qv 3.3
X12/C9-Comet LakeBIOS version that contains the fix
X12SAE/X12SCA-Fv 3.1
X12SCQv 3.1
X12SCV-LVDSv 3.1
X12SCV-Wv 3.1
X12SCZ-TLN4F/QF/Fv 3.1
C9Z490-PGWv 3.1
X12/C9-Rocket LakeBIOS version that contains the fix
X12SAE-5v 1.7
X12SCA-5Fv 1.7
C9Z590-CG(W)v 1.7