Releases: texhex/BiosSledgehammer
Releases · texhex/BiosSledgehammer
Version 3.3.2
- If the BIOS data could not be parsed, but a BIOS-Update.txt file exists, an error is generated
- If a TPM could not be found, or the data could not be parsed, but a TPM-Update.txt file exists, an error is generated
- Fixed issue #35 (Empty LOG file error)
- Supported Z420 Workstation
- Supported Z240 Tower Workstation
- Updated MPSXM to 3.23.0
- Code format changes
SHA-1: 4e5a5f3e29945d8afe2c006f697376c660caef43
SHA-256: f9d2b5fd22f56f189a12a7c2141da6453c8a464bcf8b6e5819cc7f059f07eeb2
Version 3.3.1
Added new BIOS versions that fix Spectre (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) as discussed in issue #34. For details please see HP security advisory HPSBHF03573.
The following models were updated:
- EliteBook 820 G1, EliteBook 840 G1, EliteBook 850 G1
- EliteBook 820 G2, EliteBook 840 G2, EliteBook 850 G2
- EliteBook 820 G3, EliteBook 840 G3, EliteBook 850 G3
- EliteBook 820 G4, EliteBook 840 G4, EliteBook 850 G4
- EliteBook Folio 1040 G1, EliteBook Folio 1040 G3
- EliteBook x360 1030 G2
- Pro x2 612 G2
- ProDesk 600 G1 TWR
- ProDesk 600 G2 SFF
- ProDesk 600 G3 MT, ProDesk 600 G3 SFF
- Z440 Workstation
- ZBook 15 G2
- ZBook 15 G3, ZBook 17 G3
SHA-1: 12a8bff2a886bd39dfe637b6836d14727f5f22bf
SHA-256: 5056dbe668e872cf51d7e2aefccf387f65d58008ccbdb87b21e32f6f8478c114
Version 3.3.0
- Added support for on-the-fly BIOS settings changes that are required for a TPM update using the file
TPM-BIOS-Settings.txt
(issue #27) - Added the required
TPM-BIOS-Settings.txt
files for included EliteBook 8x0 G3 and G4 models - The parameter IgnoreBitLocker can be used in
TPM-Update.txt
to prevent a full BitLocker
decryption - Fixed BitLocker detection on Windows 7 with code from GregoryMachin (issue #21)
- Intel SA75 Detection Tool updated to v1.0.3.215, XML processing changes because of this (issue #21)
- Added BIOS v1.18 for EliteBook 8x0 G3 models (issue #26)
- Added BIOS v1.08 for EliteBook 8x0 G4 models (issue #25)
SHA-1: b9a3a3fd478d816bed21282e6af3ea20a138f21d
SHA-256: 27223f990945e5ff1a27880bb5135f3973da4eff67f5711d6ba28d57c02ff2f3
Version 3.2.6
- Added new TPM firmware files (6.43 / 7.62) for G3 and G4 devices that fixes the ROCA vulnerability (aka CVE-2017-15361, HPSBHF03568 and Microsoft ADV170012)
- Added BIOS 1.06 for EliteBook 8x0 G4 models that changes the ON value for LAN / WLAN Auto Switching from EnableD to Enable (Issue #23)
- Fixed a typo in the progress text for BitLocker decryption (Issue #22)
- Fixed error handling/output in example download script
SHA-1: 35a2c191a5f4525511ff0ef363fc8442bdb6f612
SHA-256: 905e5024772e51856b71e931e99ba025df815c8b71b26e127ee867a9a2fa861d
Version 3.2.5
- Fixed a bug when querying TPM data and the returned class is incomplete (Issue #20)
- Added boot order example in BIOS-Settings for ProDesk 600 G3
SHA-1: f97d8313cec1baa40ac0b23dffd2ea1612e4ccb5
SHA-256: 11b9cd020d895a030826cfc7cd08b20ca5d41affe01f057a79a290d1cd29cc33
Version 3.2.4
- Changed BCU to BIOS communication test - now also uses SERIAL NUMBER value if UUID does not work (Issue #16)
- Return code of the BIOS update EXE is now checked and an error is logged if the return code is not 0 or 3010 (Issue #14)
- Fixed a bug in case the ME detection tool is unable to determine the firmware version
SHA-1: e1028b4512dfb705d6d56e4f865b36a9204b49e4
SHA-256: a1d5d5d89d9283b27458bdeaf02f77f24a8a4cc7bf8f1b9e02e6e17730ff1ad4
Version 3.1.2
- Fixed error message while checking for AC power or DC battery status
- Fixed bug with incorrect setting name for LAN/WLAN Auto Switching for x360 and Pro x2 (Issue #13)
- Removed BCU 4.0.15
SHA-1: 25463acdb4f1f1b590638d0b52e4c9291e246537
SHA-256: 6cf3500381afaae3d885445788af8a303193ddc93c443a02134b332f7ba9aba1
Version 3.1.0
First production-ready release for 3.x branch
- Added possibility to perform Management Engine (ME) firmware updates using
ME-Update.txt
(mainly because of the INTEL-SA-00075 / CVE-2017-5689 / HP HPSBHF03557 security issue) - Added required ME updates (incl. downloads) for ALL included models
- Before any update EXE is run, it is now checked if the device is on battery. If so, no update will be performed
- Added patch from Raynorpat to detect UUID for 8560p
- Added examples for HP Compaq 8100 Elite, HP Compaq 8200 Elite and EliteBook 8570p (from Raynorpat)
- Added examples for EliteBook 820 G1, 840 G1, 820 G2, 840 G2, 820 G4 and 840 G4
- Added examples for EliteBook Folio 1040 G2, Z440
- Added example for ZBook 15 G2, ZBook 15 G3 and ZBook 17 G3
- Added examples for EliteBook x360 1030 G2 and Pro x2 612 G2
- Fixed bug that the log file of an update EXE in a sub folder was not found - a recursive search is now used (Issue #10)
- Fixed possible bug introduced with BCU 4.0.21 that BCU fails if it was not able to create two text files (Issue #11)
- Fixed several bugs regarding TPM updates
SHA-1: db00881af7781cea10ce565bfeb649696626de2f
SHA-256: b77eeeab062d4ba1b2381089b64942d6986f624a060ebbbc6273815a72803aed
Version 3.0.4
- Fixed bug in TPM update that caused TPM firmware updates not to start
- Added ME updates examples for ALL models
- Added patch from Raynorpat to detect UUID for 8560p and examples for HP Compaq 8100 Elite, HP Compaq 8200 Elite and EliteBook 8570p
- Disabled StdOut redirection for ME updates
- Added Folio 1040 G2, ZBook 17 G3 examples
SHA-1: 28677bdb028c6da3cbdb7324b8160fa70f1376c2
SHA-256: db42b209b82c97d67700352f6fc13220fce3c8adcfa6ae9a2ec28b6262f3c4ae
Version 3.0.3
- Added possibility to perform Management Engine (ME) firmware updates using
ME-Update.txt
(mainly because of the INTEL-SA-00075 / CVE-2017-5689 / HP HPSBHF03557 security issue) - Added ME update examples for some models
- Fixed bug that the log file of an update EXE in a sub folder was not found - a recursive search is now used (issue #10)
- Fixed possible bug introduced with BCU 4.0.21 that BCU fails if it was not able to create two text files (issue #11)
- Fixed a bug that during a TPM update, BitLocker was not decrypted if the encryption was suspended
- Before any update EXE is run, it is now checked if the device is on battery. If so, no update will be performed
- Added examples for EliteBook 820 G1, 840 G1, 820 G2, 840 G2, 820 G4 and 840 G4
- Added example for ZBook 440, ZBook 15 G2 and ZBook 15 G3
- Refactored several functions
SHA-1: abacfb07164f9b36a1f63dac5a9f12e9d5935fa2
SHA-256: 795bf629dd9a82be8f69419579e74a2394cc851e763b1ce691a7acda4afeff03