{"id":13631,"date":"2020-03-12T13:10:59","date_gmt":"2020-03-12T12:10:59","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=13631"},"modified":"2024-10-03T00:12:41","modified_gmt":"2024-10-02T22:12:41","slug":"intel-patchday-march-2020","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/03\/12\/intel-patchday-march-2020\/","title":{"rendered":"Intel Patchday March 2020"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" title=\"Update\" style=\"border-left-width: 0px; border-right-width: 0px; border-bottom-width: 0px; float: left; margin: 0px 10px 0px 0px; display: inline; border-top-width: 0px\" border=\"0\" alt=\"Windows Update\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" width=\"54\" align=\"left\" height=\"54\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/03\/12\/intel-patcht-schwachstellen-in-audio-und-grafiktreibern\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>] Intel has issued a security advisory on March 10, 2020, in which vulnerabilities in various products and available updates are pointed out. A critical vulnerability is found in a graphics driver. <\/p>\n<p><!--more--><\/p>\n<p>I already became aware of a fixed vulnerability in the Windows graphics driver via the tweet from Bleeping Computer. <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Intel Patches High Severity Flaws in Windows Graphics Drivers &#8211; by <a href=\"https:\/\/twitter.com\/serghei?ref_src=twsrc%5Etfw\">@serghei<\/a><a href=\"https:\/\/t.co\/lIqu5fz9SB\">https:\/\/t.co\/lIqu5fz9SB<\/a><\/p>\n<p>\u2014 BleepingComputer (@BleepinComputer) <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1237778273846939648?ref_src=twsrc%5Etfw\">March 11, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preservef3db37070b554b8e9b4156d8574f881e\" class=\"wlWriterPreserve\"><SCRIPT charset=\"utf-8\" src=\"https:\/\/platform.twitter.com\/widgets.js\" async><\/SCRIPT><\/span> <\/p>\n<p>Below is an excerpt from the list of Intel products affected by vulnerabilities for which Intel has <a href=\"https:\/\/web.archive.org\/web\/20210516065436\/https:\/\/blogs.intel.com\/technology\/2020\/03\/ipas-security-advisories-for-march-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">published<\/a> security advisories.<\/p>\n<ul>\n<li><small><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00354.html\" target=\"_blank\" rel=\"noopener noreferrer\">INTEL-SA-00354<\/a>: <\/small><small>Intel\u00ae Smart Sound Technology Advisory, Security-Index <\/small><small>8.6<\/small>\n<li><small><a href=\"https:\/\/web.archive.org\/web\/20240305173051\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00315.html\" target=\"_blank\" rel=\"noopener noreferrer\">INTEL-SA-00315<\/a>: <\/small><small>Intel\u00ae Graphics Driver Advisory, Security-Index <\/small><small>8.4<\/small>\n<li><small><a href=\"https:\/\/web.archive.org\/web\/20230524124127\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00352.html\" target=\"_blank\" rel=\"noopener noreferrer\">INTEL-SA-00352<\/a>: <\/small><small>BlueZ Advisory, Security-Index <\/small><small>8.3<\/small>\n<li><small><a href=\"https:\/\/web.archive.org\/web\/20230524124127\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00343.html\" target=\"_blank\" rel=\"noopener noreferrer\">INTEL-SA-00343<\/a>: <\/small><small>Intel\u00ae NUC\u2122 Firmware Advisory, Security-Index <\/small><small>7.8<\/small>\n<li><small><a href=\"https:\/\/web.archive.org\/web\/20230524124128\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00349.html\" target=\"_blank\" rel=\"noopener noreferrer\">INTEL-SA-00349<\/a>: <\/small><small>Intel\u00ae MAX\u00ae 10 FPGA Advisory, Security-Index&nbsp; <\/small><small>6.1<\/small>\n<li><small>INTEL-SA-00319: <\/small><small>Intel\u00ae FPGA Programmable Acceleration Card N3000 Advisory, Security-Index <\/small><small>6<\/small>\n<li><small><a href=\"https:\/\/web.archive.org\/web\/20230811222915\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00330.html\" target=\"_blank\" rel=\"noopener noreferrer\">INTEL-SA-00330<\/a>: <\/small><small>Snoop Assisted L1D Sampling Advisory, Security-Index <\/small><small>5.6<\/small>\n<li><small>INTEL-SA-00334: <\/small><small>Intel\u00ae Processors Load Value Injection Advisory, Security-Index <\/small><small>5.6<\/small>\n<li><small><a href=\"https:\/\/web.archive.org\/web\/20230524124136\/https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00326.html\" target=\"_blank\" rel=\"noopener noreferrer\">INTEL-SA-00326<\/a>: <\/small><small>Intel\u00ae Optane\u2122 DC Persistent Memory Module Management Software Advisory, Security-Index <\/small><small>4.4<\/small><\/li>\n<\/ul>\n<p>Concerning&nbsp; INTEL-SA-00334, \"Intel\u00ae Processor Load Value Injection\" (LVI), Intel is aware of reports about this (see the blog post <a href=\"https:\/\/borncity.com\/win\/2020\/03\/10\/new-lvi-lfb-vulnerability-discovered-in-intel-cpus\/\">New LVI LFB vulnerability discovered in Intel CPUs<\/a>. Due to the many complex requirements that must be met to successfully perform the LVI method, Intel believes that LVI poses virtually no risk in real-world environments where the operating system and VMM are trusted. New guidelines and mitigation tools for LVI are now available. Details can be found in the linked articles.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German] Intel has issued a security advisory on March 10, 2020, in which vulnerabilities in various products and available updates are pointed out. A critical vulnerability is found in a graphics driver.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,22,2],"tags":[536,69,195,194],"class_list":["post-13631","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-update","category-windows","tag-driver","tag-security","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=13631"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13631\/revisions"}],"predecessor-version":[{"id":35273,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13631\/revisions\/35273"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=13631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=13631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=13631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}