Lenovo (ThinkStation) ThinkStation P920

System Firmware S05KT73A for ThinkStation P920

Atom Feed

Version 0.0.73
2024-08-07 01:37:10

This stable release fixes the following issues:

  • Enhanced Setup.

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.71
2024-03-12 09:38:24

This stable release fixes the following issues:

  • Enhanced Medina Card.
  • Enhanced Setup.

Urgency low
Reported Success 91% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.69
2023-12-19 09:32:30

This stable release fixes the following issues:

  • Update microcode to version 0x01.
  • Enhanced Setup.

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.68
2023-11-14 08:53:46

This stable release fixes the following issues:

  • Support new Lan card.

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.67
2023-08-16 09:18:59

This stable release fixes the following issues:

  • Update UEFI diag to 04.29.000.
  • Update IPU 2023.1
  • Update microcode to 0x02.

Urgency low
Reported Success 86% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.66
2023-07-24 07:48:41

This stable release fixes the following issues:

  • Support new Lan card.
  • Update Flash Tools.

Urgency low
Reported Success 90% (low confidence)
Fixed issues:
  • CVE-2023-28005

    A vulnerability in Trend Micro Endpoint Encryption Full Disk Encryption version 6.0.0.3204 and below could allow an attacker with physical access to an affected device to bypass Microsoft Windows? Secure Boot process in an attempt to execute other attacks to obtain access to the contents of the device. An attacker must first obtain physical access to the target system in order to exploit this vulnerability. It is also important to note that the contents of the drive(s) encrypted with TMEE FDE would still be protected and would NOT be accessible by the attacker by exploitation of this vulnerability alone.

Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.65
2023-05-24 08:11:40

This stable release fixes the following issues:

enhanced SMBIOS

Urgency low
Reported Success 96% (low confidence)
Fixed issues:
  • VU#309662

    Signed third party UEFI bootloaders are vulnerable to Secure Boot bypass

  • LEN-96366
  • LEN-95701
  • LEN-96365
  • LEN-96364
  • CVE-2022-34303

    CryptoPro Secure Disk: Microsoft Secure Boot Bypass Vulnerability - CryptoPro Secure Disk bootloader can replace the current bootloader to allow it to execute code before the OS loads and maintain persistence pre-OS. This is done by replacing the existing bootloader with a vulnerable one, since it is signed by Microsoft it is considered a valid bootloader until it's hash is revoked in DBX

  • CVE-2022-34302

    New Horizon Datasys Inc: Microsoft Secure Boot Bypass Vulnerability - New Horizon Datasys Inc bootloader can replace the current bootloader to allow it to execute code before the OS loads and maintain persistence pre-OS. This is done by replacing the existing bootloader with a vulnerable one, since it is signed by Microsoft it is considered a valid bootloader until it's hash is revoked in DBX

  • CVE-2022-34301

    Eurosoft (UK) Ltd: Microsoft Secure Boot Bypass Vulnerability- Eurosoft (UK) Ltd bootloader can replace the current bootloader to allow it to execute code before the OS loads and maintain persistence pre-OS. This is done by replacing the existing bootloader with a vulnerable one, since it is signed by Microsoft it is considered a valid bootloader until it's hash is revoked in DBX

  • CVE-2023-25493
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.64
2023-04-25 07:58:03

This stable release fixes the following issues:

  • Enhanced Medina Card.
  • Enhanced Setup.

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.63
2022-12-26 02:44:49

This stable release fixes the following issues:

  • Update UEFI Diagnostics to 4.26.
  • Update to IPU2022.2.
  • Update microcode to 0x02.

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.62
2022-09-05 02:51:39

This stable release fixes the following issues:

  • Update to IPU2022.1.
  • Supported new Bitland Lan Card.
  • Enhanced Fan Table Logic.
  • Update Microcode to version 0x02A.

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.60
2022-05-18 06:16:03

This stable release fixes the following issues:

  • Enhanced SMBIOS Type3.
  • Update Microcode to version 0x20A/0xC0A.
  • Update UEFI Diagnostics to 4.20
  • Enhanced USB.
  • Enhanced Setup GUI.

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
  • CVE-2021-0145

    Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2021-0127

    Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.

  • CVE-2021-33107

    Insufficiently protected credentials in USB provisioning for Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 may allow an unauthenticated user to potentially enable information disclosure via physical access.

  • CVE-2021-0158

    Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2021-0157

    Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2021-0107

    Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2021-0103

    Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.

  • CVE-2021-0099

    Insufficient control flow management in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access.

  • CVE-2021-0093

    Incorrect default permissions in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.

  • CVE-2021-0092

    Improper access control in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.

Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.58
2022-03-09 07:04:30

This stable release fixes the following issues:

  • Enhanced Smart USB Protection.

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.57
2021-12-24 02:05:45

This stable release fixes the following issues:

  • Enhanced Video Display.
  • Enhanced CPU Compatibility

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.54
2021-07-19 09:11:04

This stable release fixes the following issues:

  • Enhanced SMBIOS type9.
  • Enhanced PSU Overload.

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.53
2021-05-24 02:50:39

This stable release fixes the following issues:

  • Fix sometimes hang up after remove coin battery.
  • Support some graphics with large BAR1.
  • Support PSU Overload spec v1.3.
  • Correct SMBIOS type9.
  • Enhanced S3 resume.
  • Enhanced ThunderBolt.

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.52
2021-03-30 06:43:37

This stable release fixes the following issues:

  • Enhanced USB 3.1 Type C PCIe Adapter
  • Support some graphics with large BAR1

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.51
2021-01-28 01:58:22

This stable release fixes the following issues:

  • Update BKC to IPU2020_2.
  • Support Win10 20H2.
  • Enhanced Type 11.

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
  • CVE-2020-10255

    Modern DRAM chips (DDR4 and LPDDR4 after 2015) are affected by a vulnerability in deployment of internal mitigations against RowHammer attacks known as Target Row Refresh (TRR), aka the TRRespass issue. To exploit this vulnerability, the attacker needs to create certain access patterns to trigger bit flips on affected memory modules, aka a Many-sided RowHammer attack. This means that, even when chips advertised as RowHammer-free are used, attackers may still be able to conduct privilege-escalation attacks against the kernel, conduct privilege-escalation attacks against the Sudo binary, and achieve cross-tenant virtual-machine access by corrupting RSA keys. The issue affects chips produced by SK Hynix, Micron, and Samsung. NOTE: tracking DRAM supply-chain issues is not straightforward because a single product model from a single vendor may use DRAM chips from different manufacturers.

  • CVE-2020-12356

    Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2020-12303

    Use after free in DAL subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access.

  • CVE-2020-12297

    Improper access control in Installer for Intel(R) CSME Driver for Windows versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access.

  • CVE-2020-8705

    Insecure default initialization of resource in Intel(R) Boot Guard in Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access.

  • CVE-2020-8757

    Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-8756

    Improper input validation in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-8754

    Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.

  • CVE-2020-8753

    Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.

  • CVE-2020-8752

    Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.

  • CVE-2020-8749

    Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

  • CVE-2020-8747

    Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.

  • CVE-2020-8746

    Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.

  • CVE-2020-8745

    Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

  • CVE-2020-0590

    Improper input validation in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.

  • CVE-2020-0588

    Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-8764

    Improper access control in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • VU#231329

    Replay Protected Memory Block (RPMB) protocol does not adequately defend against replay attacks

  • LEN-43114
  • CVE-2020-12355

    Intel's CVE.

  • CVE-2020-8740

    Out of bounds write in Intel BIOS platform sample code for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-8739

    Use of potentially dangerous function in Intel BIOS platform sample code for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.

  • CVE-2020-8738

    Improper conditions check in Intel BIOS platform sample code for some Intel(R) Processors before may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-0593

    Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-0592

    Out of bounds write in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.

  • CVE-2020-0591

    Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2020-0587

    Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.50
2020-11-24 02:01:20

This stable release fixes the following issues:

  • Update microcode to version 02006A08/04003003/05003003.
  • Fixed system fan speed after S3 resume
  • Enabled extended type 17 for AEP
  • Enhanced type 11

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
  • CVE-2020-8698

    Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-8696

    Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-10713

    The grub2 bootloader can be exploited through the use of a modified grub.cfg configuration file. This can be used to to gain arbitrary code execution during the boot process when Secure Boot is enabled and enforcing signature verification and is effectively a bypass of Secure Boot that can be used to install a persistent bootkit.

  • VU#174059
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.49
2020-08-28 07:19:14

This stable release fixes the following issues:

  • Enhanced TPM Swtich UI.
  • Enhanced Setup UI.
  • Correct SMBIOS Type 11.

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.48
2020-08-06 08:01:58

This stable release fixes the following issues:

  • Support Win10 20H1.
  • Update Intel BKC to 2020 WW07.
  • Update ME to 11.22.77.1664.
  • Update Microcode to version MB750654_02006906/MBF50656_04002F01/MBF50657_05002F01.
  • Fix Capsule update failed when set AEP as 100% App Direct Mode.
  • Enhanced Setup.
  • Enhanced WMI.
  • Enhanced Fan Table logic.
  • Support PSU Overload spec v1.0.
  • Enhancement to address security vulnerability ,.

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
  • CVE-2020-0549

    Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-0548

    Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.46
2020-07-06 04:26:24

This stable release fixes the following issues:

  • Enhanced WMI
  • Enhanced Fan Table
  • Enhanced setup
  • Fix LED of BCA always show red
  • Support AMD W5700
  • Support Intel Apache Pass(AEP) Note: Capsule update can't be executed successfully if you set AEP as App Direct Mode 100% in this version.Capsule update include SIO FW update, BIOS WU/LVFS and so on.

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.44
2020-05-18 11:15:27

This stable release fixes the following issues:

  • Support Win10 19H2.
  • Update RC to IPU2019 WW36.
  • Support Common GUI.
  • Support PSU Overload spec v0.9.
  • Update RSTe UEFI driver to 6.2 PV
  • Updated UEFI Diagnostics official v04.10.00T.
  • Update microcode to 0x2B, 0x10, 0x64
  • Enhanced WMI.
  • Add password authentication before entering MEBX.
  • Enhanced Setup.
  • Enhanced Fan Table.
  • Enhanced ThunderBolt.

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
  • CVE-2019-14607

    Improper conditions check in multiple Intel® Processors may allow an authenticated user to potentially enable partial escalation of privilege, denial of service and/or information disclosure via local access.

  • CVE-2019-11157

    Improper conditions check in voltage settings for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege and/or information disclosure via local access.

  • CVE-2019-0152

    Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • LEN-28962
  • CVE-2019-0151

    Insufficient memory protection in Intel(R) TXT for certain Intel(R) Core Processors and Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.43
2020-02-14 09:36:54

This stable release fixes the following issues:

  • Update ME to version 11.22.70.1622
  • Enhanced Setup
  • Update microcode to 0x2B, 0x64
  • Enhanced WMI
  • Enhanced ThunderBolt
  • Update Fan Table
  • Enhancement to address security vulnerability LEN-28775
  • Enhancement to address security vulnerability LEN-28078
  • Enhancement to address security vulnerability LEN-29091, LEN-29093, LEN-29095, LEN-29097, LEN-29101
  • Enhancement to address security vulnerability LEN-29818

Urgency low
Reported Success 100% (low confidence)
Fixed issues:
  • CVE-2019-11135

    TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

  • CVE-2019-11139

    Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.

Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.42
2019-09-19 01:55:18

This stable release fixes the following issues:

  • Enhanced Setup.
  • Enhanced Common WMI.
  • Fix above 4G decoding.
  • Enhanced USB.

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.41
2019-08-20 02:58:30

This stable release fixes the following issues:

  • Support Win10 19H1
  • Updated UEFI Diagnostics v04.10.000.
  • Updated RC to PLR1
  • Updated Microcode to 0200005E,03000010, MBF50656_04000024 and MBF50657_05000024.
  • Updated ACM to v1_7_1
  • Updated SINIT to v1_7_2
  • Enhancement to address security vulnerability
  • Enhanced Common WMI.
  • Enhanced Setup UI.
  • Enhanced TPM.
  • Enhanced ThunderBolt.
  • Enhanced HTTP boot.

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.40
2019-07-12 09:09:26

This stable release fixes the following issues:

  • [IMPORTANT]Update includes undisclosed security fixes.For more information, refer to Lenovo's Vulnerability Disclosure Policy.
  • Enhance Setup UI.
  • Enhance Password input window.
  • Update RSTe UEFI driver to 6.1 HF.
  • Fix the issue that the resolution is changed under Shell after reboot.
  • Fix the issue that the number of CPU cores activated does not match the number of enabled CPU cores in Setup.
  • Remove the Autonomous Core C-State.

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.37
2019-05-28 02:44:09

This stable release fixes the following issues:

  • Enahnce Setup UI support.
  • Enahnce HDD password support.
  • Fix the issue that the POP can be changed when enter Setup with POP and the option "POP Changeable by User" is set to "No".

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.32
2018-12-27 10:56:59

This stable release fixes the following issues:

  • Update includes undisclosed security fixes.For more information, refer to Lenovo's Vulnerability Disclosure Policy.
  • Enahnce to support the SK8817 PS/2 keyboard.
  • Enhance WMI support.
  • Fix the issue that the front fan failure event wasn't record in SMBIOS system event log.

Urgency low
Reported Success 100% (low confidence)
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.31
2018-11-27 08:08:51

This stable release fixes the following issues:

  • Update includes undisclosed security fixes.For more information, refer to Lenovo's Vulnerability Disclosure Policy.
  • Enhance WMI support.
  • Enhance automatic detection function of Quad M.2 PCIe Card.
  • Add special password handing.
  • Update WU screen picture.

Urgency low
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.30
2018-11-07 07:37:43

This stable release fixes the following issues:

  • Fixed Sometimes PAP can not be set successfully when Current Setting set Permanently Disabled during Lenovo manufacturer process.

Urgency low
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.29
2018-10-10 06:26:05

This stable release fixes the following issues:

  • Enhance the setup UI.
  • Enhance the permanently disable computrace.
  • Enhance the fan control for multiple Madina card.
  • Enhance EC secure flash support.
  • Support the Chain of Trust for DXE Handoff.

Urgency low
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 0.0.28 — not be suitable for production systems
2018-08-07 11:16:28

This stable release fixes the following issues:

  • Update includes undisclosed security fixes.For more information, refer to Lenovo's Vulnerability Disclosure Policy.
  • Enhance the Secure Boot support.
  • Enhance the WMI support.
  • Enhance the setup UI.
  • Enhance to disable AMT function.
  • Enhance the thunderbolt support.

Urgency unknown
Licenses
Security
Release Gating
Firmware Details Compare with previous

Version 0.0.26 — not be suitable for production systems
2018-07-26 03:38:02

This stable release fixes the following issues:

  • Update includes undisclosed security fixes.For more information, refer to Lenovo's Vulnerability Disclosure Policy.
  • Enhance the ASPM support.

Urgency unknown
Licenses
Security
Release Gating
Firmware Details Compare with previous

Version 0.0.25 — not be suitable for production systems
2018-07-02 15:33:38

This stable release fixes the following issues:

  • Fix the issue of resource conflict between Thunderbolt and M.2 SSD that is installed on M.2 Slot.
  • Support Windows RS4.
  • Fix the issue that some PCIe slot options will be loaded to default by F9 in setup menu.
  • Enhance BCA feature support.
  • Dual port Thunderbolt support.
  • Add two options to control the internal USB ports.
  • Enhanced HWPM feature.
  • Enhanced M.2 SSD support.
  • Enhance WMI support.
  • Update RC to 151R03 and add the solutions for sightings.

Urgency unknown
Licenses
Security
Release Gating
Firmware Details

LVFS © 2015 Richard Hughes with icons from Font Awesome and GeoIP data from IP2Location.

Linux Vendor Firmware Service Project a Series of LF Projects, LLC :: Charter