Printable version

Drivers & software

** CRITICAL ** Online ROM Flash Component for VMware ESXi - HP ProLiant DL360 G7 (P68) Servers

By downloading, you agree to the terms and conditions of the Hewlett Packard Enterprise Software License Agreement.
Note:  Some software requires a valid warranty, current Hewlett Packard Enterprise support contract, or a license fee.

Type: BIOS (Entitlement Required) - System ROM
Version: 2018.02.22(16 Mar 2018)
Operating System(s): VMware ESXi 5.0
VMware vSphere 5.1
VMware vSphere 5.5
VMware vSphere 6.0
File name: CP035324.zip (1.7 MB)
This component provides updated system firmware that can be installed directly on supported Operating Systems. Additionally, when used in conjunction with HP Smart Update Manager (HPSUM) and Insight Control for VMware vCenter, this Component allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.

To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value:

ab3d6d5ec6062d4ffa5ed271323442b69f02108d1f4ef1261fa10fa6792ee292 CP035324.zip

Reboot Requirement:
Reboot is required after installation for updates to take effect and hardware stability to be maintained.


Installation:

IMPORTANT: This component requires that the CRU driver be loaded before the component can run.
The minimum CRU version for 5.0/5.1 is 5.0.3.9.
The minimum CRU version for 5.5 is 5.5.4.1.
The minimum CRU version for 6.0 is 6.0.8.


Offline:

  • SPP Offline mode boots a special Linux OS environment, thus the Linux Components are used, not the VMware Components


Remote Online, if the component is supported by HP SUM but is not yet part of an SPP:

 

  • Download the appropriate SPP
  • Add the component to the SPP
  • Mount the SPP on a remote server running Windows or Linux that has a network connection to the ESXi host to be updated
  • Run HP SUM
  • Add the ESXi host to be updated as a remote target/node
  • Enter IP or DNS address of the ESXi host to be updated
  • Enter the ESXi host credentials (root or administrator username and password)
  • For HP SUM 6.0 and newer, select both the Additional Package with the added component and the SPP Baseline on the node Inventory page.
  • Follow HP Smart Update Manager Steps to complete the firmware update
  • Refer to the SPP documentation for detailed instructions at:  www.hpe.com/servers/spp

To use HP Insight Control for vCenter:

 

  • Log in to the vSphere Client
  • Select a server or cluster in the inventory tree
  • Click the HP Insight Management tab
  • Follow Insight Control for vCenter steps to update firmware using a Component

To update firmware from VMware ESXi operating system on target server:

  • Enable Tech Support Mode on the ESXi host
  • Login as root. (You must be root in order to apply the update)
  • Place the Component ( CPxxxxxx.zip) in a temporary directory
  • From the same directory, unzip the Component:
    unzip CPxxxxxx.zip
  • To perform the standalone installation, execute the command:
    CPxxxxxx.vmexe
  • Follow the directions given by the Component
  • Logout
  • Disable Tech Support Mode on the ESXi host
  • Reboot your system for the firmware update to take effect

 


End User License Agreements:
HPE Software License Agreement v1
Hewlett-Packard End User License Agreement


Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important:

Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.  Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Deliverable Name:

HP ProLiant DL360 G7 System ROM - P68

Release Version:

02/22/2018

Last Recommended or Critical Revision:

02/22/2018

Previous Revision:

08/16/2015

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None


Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.  Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Firmware Dependencies:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None

Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.  Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Deliverable Name:

HP ProLiant DL360 G7 System ROM - P68

Release Version:

02/22/2018

Last Recommended or Critical Revision:

02/22/2018

Previous Revision:

08/16/2015

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None

Version:2018.05.21 (2 Jul 2018)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities.  These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis.  These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors.  Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

Firmware Dependencies:

None

Problems Fixed:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities.  These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis.  These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors.  Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

Known Issues:

None


Version:2018.02.22 (16 Mar 2018)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.  Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Firmware Dependencies:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None


Version:2015.08.16 (27 Apr 2016)
Fixes

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

While HP ProLiant servers using impacted Intel processors are not vulnerable to the specific attack announced publicly at the Blackhat USA 2015 security conference, this BIOS update includes updated microcodes from Intel which prevent the possibility of exploiting the processor vulnerability that make the attack possible. This Intel processor vulnerability is NOT unique to HP ProLiant servers.

Known Issues:

None

Version:2013.07.02 (E) (8 Oct 2015)
Fixes

Upgrade Requirement:
Critical - HP requires users update to this version immediately.


Important Notes:

Ver. 2013.07.02 (E)  contains updates to the component packaging and is functionally equivalent to ver. 2013.07.02.  It is not necessary to upgrade with Revision E if a previous component Revision was used to upgrade the system ROM to version 2013.07.02.

Firmware Dependencies:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Addressed an issue with the Intel Xeon Processor X5675, Intel Xeon Processor X5690, and Intel Xeon Processor X5687 where a rare and complex combination of data and environmental conditions may result in some instructions not executing properly causing unpredictable system behavior. This issue is not unique to HP ProLiant servers and could impact any system using the affected processors listed above. This revision of the System ROM contains and updated version of Intel's microcode that addresses this issue. This System ROM upgrade is considered a critical fix for customers utilizing the affected processors. This issue does not impact any processors that are not listed above.

Addressed an issue where the platform may experience networking issues under heavy workloads with Operating Systems, such as Linux RedHat 6.2, and IRQ Balancing enabled in the Operating System. As a result of this issue, software may lose interrupts, receive spurious interrupts or cause a network disconnect.

Known Issues:

None


Version:2013.07.02 (19 Feb 2014)
Fixes

Upgrade Requirement:
Critical - HP requires users update to this version immediately.


Important Notes:

Enhancing the flash upgrade process requires modifications to both the System ROM and the flash update utility, the System ROM revision cannot be downgraded with the flash components available on the HP Support site after updating to this revision of the System ROM. A customer can downgrade the System ROM by creating a new flash component with the older System ROM revision as indicated in Advisory C02838375 available at the following link: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?locale=en_US&objectID=c02838375

Firmware Dependencies:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Addressed an issue with the Intel Xeon Processor X5675, Intel Xeon Processor X5690, and Intel Xeon Processor X5687 where a rare and complex combination of data and environmental conditions may result in some instructions not executing properly causing unpredictable system behavior. This issue is not unique to HP ProLiant servers and could impact any system using the affected processors listed above. This revision of the System ROM contains and updated version of Intel's microcode that addresses this issue. This System ROM upgrade is considered a critical fix for customers utilizing the affected processors. This issue does not impact any processors that are not listed above.

Addressed an issue where the platform may experience networking issues under heavy workloads with Operating Systems, such as Linux RedHat 6.2, and IRQ Balancing enabled in the Operating System. As a result of this issue, software may lose interrupts, receive spurious interrupts or cause a network disconnect.

Known Issues:

None

Version:2012.12.02 (4 Jan 2013)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

After updating to this revision of the System ROM, the System ROM revision cannot be downgraded with the flash components available on the HP Support site for any ROM version 01/28/2011 or earlier. A customer can downgrade the System ROM by creating a new flash component with the older System ROM revision as indicated in Advisory C02838375 available at the following link: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?locale=en_US&objectID=c02838375

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue where the ROM Based Setup Utility (RBSU) Command Line Interface (CLI) would not set the QPI Bandwidth Optimization (RTID) feature properly.

Known Issues:

None

Enhancements

Optimized the memory settings to improve the reliability of the memory system.


Type: BIOS (Entitlement Required) - System ROM
Version: 2018.02.22(16 Mar 2018)
Operating System(s):
VMware ESXi 5.0
VMware vSphere 5.1
VMware vSphere 5.5
VMware vSphere 6.0

Description

This component provides updated system firmware that can be installed directly on supported Operating Systems. Additionally, when used in conjunction with HP Smart Update Manager (HPSUM) and Insight Control for VMware vCenter, this Component allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.

Installation Instructions

To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value:

ab3d6d5ec6062d4ffa5ed271323442b69f02108d1f4ef1261fa10fa6792ee292 CP035324.zip

Reboot Requirement:
Reboot is required after installation for updates to take effect and hardware stability to be maintained.


Installation:

IMPORTANT: This component requires that the CRU driver be loaded before the component can run.
The minimum CRU version for 5.0/5.1 is 5.0.3.9.
The minimum CRU version for 5.5 is 5.5.4.1.
The minimum CRU version for 6.0 is 6.0.8.


Offline:

  • SPP Offline mode boots a special Linux OS environment, thus the Linux Components are used, not the VMware Components


Remote Online, if the component is supported by HP SUM but is not yet part of an SPP:

 

  • Download the appropriate SPP
  • Add the component to the SPP
  • Mount the SPP on a remote server running Windows or Linux that has a network connection to the ESXi host to be updated
  • Run HP SUM
  • Add the ESXi host to be updated as a remote target/node
  • Enter IP or DNS address of the ESXi host to be updated
  • Enter the ESXi host credentials (root or administrator username and password)
  • For HP SUM 6.0 and newer, select both the Additional Package with the added component and the SPP Baseline on the node Inventory page.
  • Follow HP Smart Update Manager Steps to complete the firmware update
  • Refer to the SPP documentation for detailed instructions at:  www.hpe.com/servers/spp

To use HP Insight Control for vCenter:

 

  • Log in to the vSphere Client
  • Select a server or cluster in the inventory tree
  • Click the HP Insight Management tab
  • Follow Insight Control for vCenter steps to update firmware using a Component

To update firmware from VMware ESXi operating system on target server:

  • Enable Tech Support Mode on the ESXi host
  • Login as root. (You must be root in order to apply the update)
  • Place the Component ( CPxxxxxx.zip) in a temporary directory
  • From the same directory, unzip the Component:
    unzip CPxxxxxx.zip
  • To perform the standalone installation, execute the command:
    CPxxxxxx.vmexe
  • Follow the directions given by the Component
  • Logout
  • Disable Tech Support Mode on the ESXi host
  • Reboot your system for the firmware update to take effect

 


Release Notes

End User License Agreements:
HPE Software License Agreement v1
Hewlett-Packard End User License Agreement


Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important:

Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.  Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Deliverable Name:

HP ProLiant DL360 G7 System ROM - P68

Release Version:

02/22/2018

Last Recommended or Critical Revision:

02/22/2018

Previous Revision:

08/16/2015

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None


Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.  Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Firmware Dependencies:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None

Important

Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.  Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Deliverable Name:

HP ProLiant DL360 G7 System ROM - P68

Release Version:

02/22/2018

Last Recommended or Critical Revision:

02/22/2018

Previous Revision:

08/16/2015

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None

Revision History

Version:2018.05.21 (2 Jul 2018)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities.  These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis.  These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors.  Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

Firmware Dependencies:

None

Problems Fixed:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities.  These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis.  These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors.  Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

Known Issues:

None


Version:2018.02.22 (16 Mar 2018)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.  Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Firmware Dependencies:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None


Version:2015.08.16 (27 Apr 2016)
Fixes

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

While HP ProLiant servers using impacted Intel processors are not vulnerable to the specific attack announced publicly at the Blackhat USA 2015 security conference, this BIOS update includes updated microcodes from Intel which prevent the possibility of exploiting the processor vulnerability that make the attack possible. This Intel processor vulnerability is NOT unique to HP ProLiant servers.

Known Issues:

None

Version:2013.07.02 (E) (8 Oct 2015)
Fixes

Upgrade Requirement:
Critical - HP requires users update to this version immediately.


Important Notes:

Ver. 2013.07.02 (E)  contains updates to the component packaging and is functionally equivalent to ver. 2013.07.02.  It is not necessary to upgrade with Revision E if a previous component Revision was used to upgrade the system ROM to version 2013.07.02.

Firmware Dependencies:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Addressed an issue with the Intel Xeon Processor X5675, Intel Xeon Processor X5690, and Intel Xeon Processor X5687 where a rare and complex combination of data and environmental conditions may result in some instructions not executing properly causing unpredictable system behavior. This issue is not unique to HP ProLiant servers and could impact any system using the affected processors listed above. This revision of the System ROM contains and updated version of Intel's microcode that addresses this issue. This System ROM upgrade is considered a critical fix for customers utilizing the affected processors. This issue does not impact any processors that are not listed above.

Addressed an issue where the platform may experience networking issues under heavy workloads with Operating Systems, such as Linux RedHat 6.2, and IRQ Balancing enabled in the Operating System. As a result of this issue, software may lose interrupts, receive spurious interrupts or cause a network disconnect.

Known Issues:

None


Version:2013.07.02 (19 Feb 2014)
Fixes

Upgrade Requirement:
Critical - HP requires users update to this version immediately.


Important Notes:

Enhancing the flash upgrade process requires modifications to both the System ROM and the flash update utility, the System ROM revision cannot be downgraded with the flash components available on the HP Support site after updating to this revision of the System ROM. A customer can downgrade the System ROM by creating a new flash component with the older System ROM revision as indicated in Advisory C02838375 available at the following link: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?locale=en_US&objectID=c02838375

Firmware Dependencies:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Addressed an issue with the Intel Xeon Processor X5675, Intel Xeon Processor X5690, and Intel Xeon Processor X5687 where a rare and complex combination of data and environmental conditions may result in some instructions not executing properly causing unpredictable system behavior. This issue is not unique to HP ProLiant servers and could impact any system using the affected processors listed above. This revision of the System ROM contains and updated version of Intel's microcode that addresses this issue. This System ROM upgrade is considered a critical fix for customers utilizing the affected processors. This issue does not impact any processors that are not listed above.

Addressed an issue where the platform may experience networking issues under heavy workloads with Operating Systems, such as Linux RedHat 6.2, and IRQ Balancing enabled in the Operating System. As a result of this issue, software may lose interrupts, receive spurious interrupts or cause a network disconnect.

Known Issues:

None

Version:2012.12.02 (4 Jan 2013)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

After updating to this revision of the System ROM, the System ROM revision cannot be downgraded with the flash components available on the HP Support site for any ROM version 01/28/2011 or earlier. A customer can downgrade the System ROM by creating a new flash component with the older System ROM revision as indicated in Advisory C02838375 available at the following link: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?locale=en_US&objectID=c02838375

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue where the ROM Based Setup Utility (RBSU) Command Line Interface (CLI) would not set the QPI Bandwidth Optimization (RTID) feature properly.

Known Issues:

None

Enhancements

Optimized the memory settings to improve the reliability of the memory system.


Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models.