<?xml version="1.0" encoding="UTF-8"?>
<cpq_package version="2.0.1.0">
  <filename>U41_3.60_08_06_2025.fwpkg</filename>
  <divisions>
    <division key="6">
      <division_xlate lang="en">Server</division_xlate>
      <division_xlate lang="cn">服务器</division_xlate>
      <division_xlate lang="ja">サーバ</division_xlate>
      <division_xlate lang="ko">서버</division_xlate>
      <division_xlate lang="tw">伺服器</division_xlate>
    </division>
  </divisions>
  <operating_systems>
    <operating_system key="">
      <operating_system_xlate>VMware vSphere 6.7</operating_system_xlate>
    </operating_system>
    <operating_system key="">
      <operating_system_xlate>VMware vSphere 6.5</operating_system_xlate>
    </operating_system>
    <operating_system key="">
      <operating_system_xlate>VMware vSphere 6.0</operating_system_xlate>
    </operating_system>
    <operating_system key="96">
      <operating_system_xlate>Cross Operating System</operating_system_xlate>
    </operating_system>
    <operating_system key="">
      <operating_system_xlate>VMware ESXi 7.0</operating_system_xlate>
    </operating_system>
    <operating_system key="">
      <operating_system_xlate>VMware ESXi 8.0</operating_system_xlate>
    </operating_system>
  </operating_systems>
  <products>
    <product rom="U41"/>
  </products>
  <category key="1200212">
    <category_xlate lang="en">BIOS - System ROM</category_xlate>
  </category>
  <id product="2b44e5307a9948769c51d6ac1f276915" version="1cfd3fa8d0a94679b8ed6b063bea8269"/>
  <name>
    <name_xlate lang="en">ROM Flash Firmware Package - HPE ProLiant ML350 Gen10 (U41) Servers</name_xlate>
    <name_xlate lang="cn">ROM Flash Firmware Package - HPE ProLiant ML350 Gen10 (U41) Servers</name_xlate>
    <name_xlate lang="ja">ROM Flash Firmware Package - HPE ProLiant ML350 Gen10 (U41) Servers</name_xlate>
    <name_xlate lang="ko">ROM Flash Firmware Package - HPE ProLiant ML350 Gen10 (U41) Servers</name_xlate>
    <name_xlate lang="tw">ROM Flash Firmware Package - HPE ProLiant ML350 Gen10 (U41) Servers</name_xlate>
  </name>
  <alt_name>
    <alt_name_xlate lang="en">HPE ProLiant ML350 Gen10 (U41) Servers</alt_name_xlate>
    <alt_name_xlate lang="cn">HPE ProLiant ML350 Gen10 (U41) Servers</alt_name_xlate>
    <alt_name_xlate lang="ja">HPE ProLiant ML350 Gen10 (U41) Servers</alt_name_xlate>
    <alt_name_xlate lang="ko">HPE ProLiant ML350 Gen10 (U41) Servers</alt_name_xlate>
    <alt_name_xlate lang="tw">HPE ProLiant ML350 Gen10 (U41) Servers</alt_name_xlate>
  </alt_name>
  <version value="3.60_08-06-2025" revision="" type_of_change="1"/>
  <manufacturer_name>
    <manufacturer_name_xlate lang="en">Hewlett Packard Enterprise</manufacturer_name_xlate>
    <manufacturer_name_xlate lang="cn">惠普企业</manufacturer_name_xlate>
    <manufacturer_name_xlate lang="ja">Hewlett Packard Enterprise</manufacturer_name_xlate>
    <manufacturer_name_xlate lang="ko">Hewlett Packard Enterprise</manufacturer_name_xlate>
    <manufacturer_name_xlate lang="tw">Hewlett Packard Enterprise</manufacturer_name_xlate>
  </manufacturer_name>
  <languages langlist="en">
    <languages_xlate lang="en">English (US)</languages_xlate>
    <languages_xlate lang="ja">英語（US）</languages_xlate>
    <languages_xlate lang="ko">영어(미국)</languages_xlate>
    <languages_xlate lang="cn">英语（美国）</languages_xlate>
    <languages_xlate lang="tw">美式英文</languages_xlate>
  </languages>
  <release_date year="2025" month="9" day="7" hour="6" minute="15" second="15"/>
  <description>
    <description_xlate lang="en">
<![CDATA[This firmware package provides updated system firmware that can be installed online through the use of tools such as Smart Update Manager (SUM) and the RESTful Interface Tool (iLOrest) on supported Operating Systems. Additionally, when used in conjunction with SUM or iLOrest, this firmware package allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.]]>
</description_xlate>
    <description_xlate lang="cn">
<![CDATA[This firmware package provides updated system firmware that can be installed online through the use of tools such as Smart Update Manager (SUM) and the RESTful Interface Tool (iLOrest) on supported Operating Systems. Additionally, when used in conjunction with SUM or iLOrest, this firmware package allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.]]>
</description_xlate>
    <description_xlate lang="ja">
<![CDATA[This firmware package provides updated system firmware that can be installed online through the use of tools such as Smart Update Manager (SUM) and the RESTful Interface Tool (iLOrest) on supported Operating Systems. Additionally, when used in conjunction with SUM or iLOrest, this firmware package allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.]]>
</description_xlate>
    <description_xlate lang="ko">
<![CDATA[This firmware package provides updated system firmware that can be installed online through the use of tools such as Smart Update Manager (SUM) and the RESTful Interface Tool (iLOrest) on supported Operating Systems. Additionally, when used in conjunction with SUM or iLOrest, this firmware package allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.]]>
</description_xlate>
    <description_xlate lang="tw">
<![CDATA[This firmware package provides updated system firmware that can be installed online through the use of tools such as Smart Update Manager (SUM) and the RESTful Interface Tool (iLOrest) on supported Operating Systems. Additionally, when used in conjunction with SUM or iLOrest, this firmware package allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.]]>
</description_xlate>
  </description>
  <prerequisite_notes/>
  <installation_notes>
    <installation_notes_xlate lang="en">
      <installation_notes_xlate_part>
<![CDATA[<p>To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href="https://www.hpe.com/info/resttool">http://www.hpe.com/info/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p>

<p>localhost OS example:<br />
<strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p>

<p>remote example:<br />
<strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO5_IP_Address&gt; -u &lt;iLO5_username&gt; -p &lt;iLO5_password&gt;</em></strong></p>

<p><br />
This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p>

<p><strong>Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href="http://www.hpe.com/info/spp">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p>

<ul>
	<li>Place the Service Pack for ProLiant on a USB key using the&nbsp;USB Key Creator Utility.</li>
	<li>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\packages&quot; on the USB key.</li>
</ul>

<p>Update the firmware and software&nbsp;in the usual manner.</p>

<p>Reboot your system for the update to take effect immediately.</p>
]]>
</installation_notes_xlate_part>
    </installation_notes_xlate>
    <installation_notes_xlate lang="cn">
      <installation_notes_xlate_part>
<![CDATA[<p>To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href="https://www.hpe.com/info/resttool">http://www.hpe.com/info/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p>

<p>localhost OS example:<br />
<strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p>

<p>remote example:<br />
<strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO5_IP_Address&gt; -u &lt;iLO5_username&gt; -p &lt;iLO5_password&gt;</em></strong></p>

<p><br />
This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p>

<p><strong>Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href="http://www.hpe.com/info/spp">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p>

<ul>
	<li>Place the Service Pack for ProLiant on a USB key using the&nbsp;USB Key Creator Utility.</li>
	<li>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\packages&quot; on the USB key.</li>
</ul>

<p>Update the firmware and software&nbsp;in the usual manner.</p>

<p>Reboot your system for the update to take effect immediately.</p>
]]>
</installation_notes_xlate_part>
    </installation_notes_xlate>
    <installation_notes_xlate lang="ja">
      <installation_notes_xlate_part>
<![CDATA[<p>このファームウェアパッケージをフラッシュするには、次のiLOrestコマンドを使用します。 iLOrestツールの最新バージョンをダウンロードするには、<a href="https://www.hpe.com/info/resttool">http://www.hpe.com/info/resttool</a>を参照してください。</p>

<p>ローカルホストOSの例：<br />
<strong><em>ilorest flashfwpkg <file_name.fwpkg> </em></strong></p>

<p>リモートの例:<br />
<strong><em>ilorest flashfwpkg <file_name.fwpkg> --url <iLO5_IP_Address> -u <iLO5_username> -p <iLO5_password></em></strong></p>

<p><br />
このファームウェアパッケージは、Smart Update Manager(SUM)の最新バージョンでもインストールできます。</p>

<p>サポートされるProLiantサーバーおよびオプションのための<strong>サプリメンタルアップデート</strong>は、<strong><a href="http://www.hpe.com/info/spp">Service Pack for ProLiant</a></strong> (SPP) ISO上にあるSUMを使用して実行できます。</p>

<ul>
	<li>USB Key Creator Utilityを使用して、Service Pack for ProLiantをUSBキーにコピーします。</li>
	<li>アップデートに必要なファームウェアパッケージおよびコンポーネントをUSBキーの"\packages"ディレクトリにコピーします。</li>
</ul>

<p>通常の手順でファームウェアおよびソフトウェアをアップデートします。</p>

<p>アップデートを直ちに有効にするにはシステムを再起動してください。</p>
]]>
</installation_notes_xlate_part>
    </installation_notes_xlate>
    <installation_notes_xlate lang="ko">
      <installation_notes_xlate_part>
<![CDATA[<p>To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href="https://www.hpe.com/info/resttool">http://www.hpe.com/info/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p>

<p>localhost OS example:<br />
<strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p>

<p>remote example:<br />
<strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO5_IP_Address&gt; -u &lt;iLO5_username&gt; -p &lt;iLO5_password&gt;</em></strong></p>

<p><br />
This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p>

<p><strong>Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href="http://www.hpe.com/info/spp">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p>

<ul>
	<li>Place the Service Pack for ProLiant on a USB key using the&nbsp;USB Key Creator Utility.</li>
	<li>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\packages&quot; on the USB key.</li>
</ul>

<p>Update the firmware and software&nbsp;in the usual manner.</p>

<p>Reboot your system for the update to take effect immediately.</p>
]]>
</installation_notes_xlate_part>
    </installation_notes_xlate>
    <installation_notes_xlate lang="tw">
      <installation_notes_xlate_part>
<![CDATA[<p>To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href="https://www.hpe.com/info/resttool">http://www.hpe.com/info/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p>

<p>localhost OS example:<br />
<strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p>

<p>remote example:<br />
<strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO5_IP_Address&gt; -u &lt;iLO5_username&gt; -p &lt;iLO5_password&gt;</em></strong></p>

<p><br />
This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p>

<p><strong>Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href="http://www.hpe.com/info/spp">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p>

<ul>
	<li>Place the Service Pack for ProLiant on a USB key using the&nbsp;USB Key Creator Utility.</li>
	<li>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\packages&quot; on the USB key.</li>
</ul>

<p>Update the firmware and software&nbsp;in the usual manner.</p>

<p>Reboot your system for the update to take effect immediately.</p>
]]>
</installation_notes_xlate_part>
    </installation_notes_xlate>
  </installation_notes>
  <availability_notes/>
  <documentation_notes/>
  <revision_history>
    <revision>
      <version value="3.60_08-06-2025" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Purley IPU2025.3 update.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.201.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system RBSU setting change might not take effect when the System ROM is being updated.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Purley IPU2025.3 update.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.201.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system RBSU setting change might not take effect when the System ROM is being updated.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Purley IPU2025.3 update.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.201.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system RBSU setting change might not take effect when the System ROM is being updated.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Purley IPU2025.3 update.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.201.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system RBSU setting change might not take effect when the System ROM is being updated.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Purley IPU2025.3 update.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.201.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system RBSU setting change might not take effect when the System ROM is being updated.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="3.50_04-17-2025" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Removed Expired SUSE and Vmware Certificates.</p><p>Improved detection and interaction with certain PCIe cards during UEFI HBA discovery process.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Removed Expired SUSE and Vmware Certificates.</p><p>Improved detection and interaction with certain PCIe cards during UEFI HBA discovery process.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>期限切れのSUSEおよびVMwareの証明書を削除しました。</p><p>UEFI HBA検出プロセス中の特定のPCIeカードの検出と相互作用を改善しました。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Removed Expired SUSE and Vmware Certificates.</p><p>Improved detection and interaction with certain PCIe cards during UEFI HBA discovery process.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Removed Expired SUSE and Vmware Certificates.</p><p>Improved detection and interaction with certain PCIe cards during UEFI HBA discovery process.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system might have false IML message "Processor X, DIMM Y - This NVDIMM is NOT a HPE SmartMemory NVDIMM".</p><p>Addressed an issue where the system might trigger BitLocker Recovery after reboot.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system might have false IML message "Processor X, DIMM Y - This NVDIMM is NOT a HPE SmartMemory NVDIMM".</p><p>Addressed an issue where the system might trigger BitLocker Recovery after reboot.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMは、Server Platform Services（SPS）ファームウェア04.01.05.105と組み合わせる必要があります。<p><p>報告されたセキュリティ脆弱性とその緩和策の詳細については、リンク<a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">セキュリティ報告ライブラリ | HPE サポート</a>を参照してください。</p></p>
<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題点:</strong></p><p>システムに誤ったIMLメッセージ"Processor X, DIMM Y - This NVDIMM is NOT a HPE SmartMemory NVDIMM"が表示される可能性がある問題に対処しました。</p><p>再起動後にシステムがBitLockerリカバリをトリガーする可能性がある問題に対処しました。</p><p><strong>既知の問題点：</strong></p> なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system might have false IML message "Processor X, DIMM Y - This NVDIMM is NOT a HPE SmartMemory NVDIMM".</p><p>Addressed an issue where the system might trigger BitLocker Recovery after reboot.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system might have false IML message "Processor X, DIMM Y - This NVDIMM is NOT a HPE SmartMemory NVDIMM".</p><p>Addressed an issue where the system might trigger BitLocker Recovery after reboot.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="3.42_02-21-2025" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added pop-up message for all Intelligent Provisioning boot paths to warn users of the risk of data loss.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added pop-up message for all Intelligent Provisioning boot paths to warn users of the risk of data loss.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>データ損失のリスクをユーザーに警告するために、すべての Intelligent Provisioning ブートパスにポップアップメッセージを追加しました。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added pop-up message for all Intelligent Provisioning boot paths to warn users of the risk of data loss.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added pop-up message for all Intelligent Provisioning boot paths to warn users of the risk of data loss.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system iLO remote console might hang in glyph loop error handling when the System Utilities Language is set to Japanese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system iLO remote console might hang in glyph loop error handling when the System Utilities Language is set to Japanese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMは、Server Platform Services（SPS）ファームウェア04.01.05.105と組み合わせる必要があります。<p><p>報告されたセキュリティ脆弱性とその緩和策の詳細については、次のリンクを参照してください。<a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">セキュリティ報告ライブラリ | HPE サポート</a>。</p></p>
<p><strong>ファームウェアの関連性：</strong></p>なし<p><strong>修正された問題点：</strong></p><p>システムユーティリティ言語が日本語に設定されている場合に、システムiLOリモートコンソールがグリフループエラー処理でハングする可能性がある問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system iLO remote console might hang in glyph loop error handling when the System Utilities Language is set to Japanese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.<p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p></p>
<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system iLO remote console might hang in glyph loop error handling when the System Utilities Language is set to Japanese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="3.40_01-16-2025" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel IPU2025.1 updates.</p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.</p>

<p>Details about reported security vulnerabilities and their mitigation can be found at the following link&nbsp;<a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system would uses UUID for IPV6 DHCP even when DUID-LLT is selected.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel IPU2025.1 updates.</p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.</p>

<p>Details about reported security vulnerabilities and their mitigation can be found at the following link&nbsp;<a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system would uses UUID for IPV6 DHCP even when DUID-LLT is selected.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>このバージョンのシステムROMには、Intel IPU2025.1アップデートに合わせたアップデートが含まれています。</p>

<p>このバージョンのシステムROMは、Server Platform Services（SPS）ファームウェア04.01.05.105と組み合わせる必要があります。</p>

<p>報告されたセキュリティ脆弱性とその緩和策の詳細については、リンク<a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">セキュリティ報告ライブラリ | HPEサポート</a>を参照してください。</p>

<p><strong>ファームウェアの関連性：</strong></p>

<p>なし</p>

<p><strong>修正された問題点:</strong></p>

<p>DUID-LLTが選択されている場合でもシステムがIPV6 DHCPにUUIDを使用する問題に対処しました。</p>

<p><strong>既知の問題点：</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel IPU2025.1 updates.</p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.</p>

<p>Details about reported security vulnerabilities and their mitigation can be found at the following link&nbsp;<a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system would uses UUID for IPV6 DHCP even when DUID-LLT is selected.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel IPU2025.1 updates.</p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.105.</p>

<p>Details about reported security vulnerabilities and their mitigation can be found at the following link&nbsp;<a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">Security Bulletin Library | HPE Support</a>.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system would uses UUID for IPV6 DHCP even when DUID-LLT is selected.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="3.34_09-30-2024" revision="" type_of_change="0"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Fixed an issue where system may reboot infinitely when a faulty PCIE card was installed. </p><p>Fixed an issue where the firmware versions of iLO and Backplane showed incorrectly.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Fixed an issue where system may reboot infinitely when a faulty PCIE card was installed. </p><p>Fixed an issue where the firmware versions of iLO and Backplane showed incorrectly.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>なし<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題点：</strong></p><p>障害のあるPCIE ードが取り付けられている場合、システムが無限に再起動する可能性がある問題を修正しました。</p><p>iLOとバックプレーンのファームウェアバージョンが誤って表示される問題を修正しました。</p><p><strong>既知の問題点：</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Fixed an issue where system may reboot infinitely when a faulty PCIE card was installed. </p><p>Fixed an issue where the firmware versions of iLO and Backplane showed incorrectly.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Fixed an issue where system may reboot infinitely when a faulty PCIE card was installed. </p><p>Fixed an issue where the firmware versions of iLO and Backplane showed incorrectly.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="3.32_08-29-2024" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where system was not compliant with WS2025 HSTI requirement.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where system was not compliant with WS2025 HSTI requirement.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p><p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題点：</strong></p><p>システムがWS2025 HSTI要件に準拠していない問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where system was not compliant with WS2025 HSTI requirement.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where system was not compliant with WS2025 HSTI requirement.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="3.30_07-31-2024" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.3 guidance. This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where NS204i may not be identified as an NVMe device.</p>

<p>Addressed an issue where the Logical Drive name was cleared in RBSU after leaving the configuration page of an MR controller.</p>

<p>Addressed an issue where the &quot;Physical Drive missing&quot; message appeared twice in POST when a drive was removed and rebooted with incorrect severity in IML.</p>

<p>Addressed an issue where the boot order was cleared unexpectedly after configuring System Configuration (RBSU) options and navigating to Boot Options &gt; UEFI Boot Settings &gt; UEFI Boot Order, and then pressing F12 to Save and Exit.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.3 guidance. This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where NS204i may not be identified as an NVMe device.</p>

<p>Addressed an issue where the Logical Drive name was cleared in RBSU after leaving the configuration page of an MR controller.</p>

<p>Addressed an issue where the &quot;Physical Drive missing&quot; message appeared twice in POST when a drive was removed and rebooted with incorrect severity in IML.</p>

<p>Addressed an issue where the boot order was cleared unexpectedly after configuring System Configuration (RBSU) options and navigating to Boot Options &gt; UEFI Boot Settings &gt; UEFI Boot Order, and then pressing F12 to Save and Exit.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>このバージョンのシステムROMには、Intel製品アップデート(IPU)バージョンIPU.2024.3ガイダンスに沿ったアップデートが含まれています。このバージョンのシステムROMは、Server Platform Services（SPS）ファームウェア04.01.05.002と組み合わせる必要があります。</p>

<p><strong>ファームウェアの依存関係：</strong></p>

<p>なし</p>

<p><strong>修正された問題点：</strong></p>

<p>NS204iがNVMeデバイスとして識別されない可能性がある問題に対処しました。</p>

<p>MRコントローラーの構成ページを離れた後にRBSUで論理ドライブ名がクリアされる問題に対処しました。</p>

<p>ドライブが取り外され、IMLで誤った重大度で再起動された場合に、POSTで"物理ドライブがありません"というメッセージが2回表示される問題に対処しました。</p>

<p>システム構成（RBSU）オプションを構成し、[ブートオプション] > [UEFIブート設定] > [UEFIブート順序]に移動し、F12キーを押して保存および終了した後、ブート順序が予期せずクリアされる問題に対処しました。</p>

<p><strong>既知の問題点：</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.3 guidance. This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where NS204i may not be identified as an NVMe device.</p>

<p>Addressed an issue where the Logical Drive name was cleared in RBSU after leaving the configuration page of an MR controller.</p>

<p>Addressed an issue where the &quot;Physical Drive missing&quot; message appeared twice in POST when a drive was removed and rebooted with incorrect severity in IML.</p>

<p>Addressed an issue where the boot order was cleared unexpectedly after configuring System Configuration (RBSU) options and navigating to Boot Options &gt; UEFI Boot Settings &gt; UEFI Boot Order, and then pressing F12 to Save and Exit.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.3 guidance. This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where NS204i may not be identified as an NVMe device.</p>

<p>Addressed an issue where the Logical Drive name was cleared in RBSU after leaving the configuration page of an MR controller.</p>

<p>Addressed an issue where the &quot;Physical Drive missing&quot; message appeared twice in POST when a drive was removed and rebooted with incorrect severity in IML.</p>

<p>Addressed an issue where the boot order was cleared unexpectedly after configuring System Configuration (RBSU) options and navigating to Boot Options &gt; UEFI Boot Settings &gt; UEFI Boot Order, and then pressing F12 to Save and Exit.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="3.20_05-27-2024" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added value "C6 without C1E" in System Configuration (RBSU) option "Power Management/Advanced Power Options menu/Minimum Processor Idle Power Core C-State". When selected, the Minimum Processor Idle Power Core C-State is C6 with C1E disabled. This setting has the following Redfish property: /redfish/v1/systems/1/bios/MinProcIdlePower</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added value "C6 without C1E" in System Configuration (RBSU) option "Power Management/Advanced Power Options menu/Minimum Processor Idle Power Core C-State". When selected, the Minimum Processor Idle Power Core C-State is C6 with C1E disabled. This setting has the following Redfish property: /redfish/v1/systems/1/bios/MinProcIdlePower</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>システム構成（RBSU）オプションの「電力およびパフォーマンスオプション/最小プロセッサーアイドル電力コアCステート」に値「C6ステート-C1Eなし」を追加しました。選択すると、最小プロセッサーアイドル電力コアCステートはC6になり、C1Eは無効になります。この設定には次のRedfishプロパティがあります：/redfish/v1/systems/1/bios/MinProcIdlePower</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added value "C6 without C1E" in System Configuration (RBSU) option "Power Management/Advanced Power Options menu/Minimum Processor Idle Power Core C-State". When selected, the Minimum Processor Idle Power Core C-State is C6 with C1E disabled. This setting has the following Redfish property: /redfish/v1/systems/1/bios/MinProcIdlePower</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added value "C6 without C1E" in System Configuration (RBSU) option "Power Management/Advanced Power Options menu/Minimum Processor Idle Power Core C-State". When selected, the Minimum Processor Idle Power Core C-State is C6 with C1E disabled. This setting has the following Redfish property: /redfish/v1/systems/1/bios/MinProcIdlePower</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2021-38578, CVE-2023-5678 and CVE-2024-0727.

The security vulnerabilities are documented in the CVE report site. They are not unique to HPE servers.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where system may encounter a RSOD while updating SAS drive FW via HPE Service Packs, including, but not limited to, VMware ESXi Online HDD FW Component Bundle 16.00, HPE Synergy Service Pack (SSP) 2024.01.02 (January 2024) and the future HPE Synergy Service Pack (SSP) 2024.07.01 (July 2024).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2021-38578, CVE-2023-5678 and CVE-2024-0727.

The security vulnerabilities are documented in the CVE report site. They are not unique to HPE servers.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where system may encounter a RSOD while updating SAS drive FW via HPE Service Packs, including, but not limited to, VMware ESXi Online HDD FW Component Bundle 16.00, HPE Synergy Service Pack (SSP) 2024.01.02 (January 2024) and the future HPE Synergy Service Pack (SSP) 2024.07.01 (July 2024).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このシステムROMのリビジョンには、セキュリティ脆弱性のCVE-2021-38578、CVE-2023-5678およびCVE-2024-0727の修正が含まれています。セキュリティ上の脆弱性は、CVEレポートサイトに記載されています。これらはHPEサーバーに固有のものではありません。このバージョンのシステムROMは、Server Platform Services（SPS）ファームウェア04.01.05.002と組み合わせる必要があります。<p><strong>ファームウェアの依存関係：</strong></p> なし<p><strong>修正された問題点：</strong></p><p>VMware ESXi Online HDD FW Component Bundle 16.00、HPE Synergy Service Pack(SSP)2024.01.02（2024年1月）、および将来のHPE Synergy Service Pack(SSP)2024.07.01（2024年7月）を含む（ただし限定されない）HPEサービスパックを使用してSASドライブFWのアップデート中にRSODが発生する可能性がある問題に対処しました。</p><p><strong>既知の問題点：</strong></p> なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2021-38578, CVE-2023-5678 and CVE-2024-0727.

The security vulnerabilities are documented in the CVE report site. They are not unique to HPE servers.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where system may encounter a RSOD while updating SAS drive FW via HPE Service Packs, including, but not limited to, VMware ESXi Online HDD FW Component Bundle 16.00, HPE Synergy Service Pack (SSP) 2024.01.02 (January 2024) and the future HPE Synergy Service Pack (SSP) 2024.07.01 (July 2024).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2021-38578, CVE-2023-5678 and CVE-2024-0727.

The security vulnerabilities are documented in the CVE report site. They are not unique to HPE servers.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where system may encounter a RSOD while updating SAS drive FW via HPE Service Packs, including, but not limited to, VMware ESXi Online HDD FW Component Bundle 16.00, HPE Synergy Service Pack (SSP) 2024.01.02 (January 2024) and the future HPE Synergy Service Pack (SSP) 2024.07.01 (July 2024).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>CVE-2021-38575用のパッチ：この脆弱性により、リモート攻撃者はターゲットシステム上で任意のコードを実行することが可能になります。</p><p></p><p>SMBIOSタイプ211のプライマリAPIC IDにパッチを適用します。一部の特殊なCPUにはプロセッサー内APIC ID == 00hがない場合があり、誤ったTControlデータが発生する可能性があります。</p><p></p><p>CVE-2023-45853用のパッチ：この脆弱性により、リモート攻撃者はターゲットシステム上で任意のコードを実行することが可能になります。</p><p>この脆弱性は、NetworkPkg/IScsiDxeのIScsiHexToBin()関数の境界エラーが原因で存在します。edk2とiSCSIターゲット間の通信にデータを挿入する能力があるリモート攻撃者は、ターゲットシステム上で任意のコードを実行する可能性があります。</p><p></p><p>非標準のVPDコンテンツによってUEFI読み取り機能が書き込み状態になるのを防止しました。</p><p></p><p>CVE-2022-36763およびCVE-2022-36764用のパッチ：EDK2はTcg2MeasureGptTable()関数の脆弱性の影響を受けやすく、ユーザーがローカルネットワーク経由でヒープバッファーオーバーフローを引き起こす可能性があります。この脆弱性の悪用に成功すると、機密性、完全性、可用性が危険にさらされる可能性があります。</p><p></p><p>IMLの新しいイベントサポートを追加しました。</p><p></p><p>CVE-2023-45229用のパッチ：EDK2 NetworkPkgの脆弱性</p><p></p><p>iLO障害によるBIOSのハングを回避するための追加の再試行メカニズムを追加しました。</p><p></p><p>URIでvN_N_NからN.N.Nに変更されたRedfishプロパティ値を修正しました。</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    ここで、{lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    Redfish仕様として定義されたバージョン番号</p><p>    [例]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    RegistryVersionのプロパティがv1_1_20から1.1.20に変更されました</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>なし<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題点：</strong></p><p>SBCEおよびECCストームレコードがAHSから消える可能性がある問題に対処しました。</p><p></p><p>iSCSI IpAddressTypeがAutoに設定されている場合に、OSでiSCSI SW IPv6 HDDが見つからない問題に対処しました。</p><p></p><p>IE機能エラーによりサーバーがハングする可能性がある問題に対処しました。</p><p></p><p>脆弱性に対するEDK2のソリューションをマージしました。</p><p>  - 長いサーバーIDのオプションによるDHCPv6クライアントでのバッファオーバーフロー</p><p>  - 切り捨てられたオプションを含むNDリダイレクトメッセージを処理する場合の境界を超えた読み取り</p><p>  - Destination Optionsヘッダー内の不明のオプションを解析する場合の無限ループ</p><p>  - Destination Optionsヘッダー内のPadNオプションを解析する場合の無限ループ</p><p>  - DHCPv6アドバタイズメッセージのDNSサーバーオプションを処理する場合のバッファオーバーフロー</p><p>  - 予測可能なTCP ISN</p><p>  - 弱い擬似乱数ジェネレーターの使用</p><p><strong>既知の問題点：</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="3.00_10-19-2023" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>[自動電源オン]オプションのヘルプテキスト内の"AC電源"を"外部電源"に置き換えました。これは、ProLiantサーバーがDC電源装置オプションも提供しているためです。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>なし<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題点：</strong></p><p>iLO Webからの[工場デフォルトのリストア]および[デフォルトのリストア]によってセキュアブートステータスがリストアされない問題に対処しました。</p><p></p><p></p><p>BIOSがCPUステータスをiLOに正しく報告せず、訂正不能なマシンチェック例外（UMCE）が発生したときにOneViewが通知を受け取る問題に対処しました。</p><p></p><p></p><p>RBSUからIMLログにアクセス中にシステムがハングする可能性がある問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.90_07-20-2023" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zh update which provides mitigation for security vulnerabilities documented as CVE-2023-2650.</p><p></p><p>Addressed an issue where iLO embedded device health info would display blank content under RBSU when the Language was set to Japanese or Chinese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zh update which provides mitigation for security vulnerabilities documented as CVE-2023-2650.</p><p></p><p>Addressed an issue where iLO embedded device health info would display blank content under RBSU when the Language was set to Japanese or Chinese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2023.3ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし        <p><strong>修正された問題：</strong></p><p>このシステムROMのリビジョンには、BIOSアドバイザリと、CVE-2022-43505およびCVE-2022-40982として文書化されているセキュリティ上の脆弱性に対するインテルの緩和策を提供するインテルIPU 2023.3 BIOSアップデートの最新リビジョンが含まれています。このセキュリティ上の脆弱性は、CVEレポートサイトに記録されています。この問題は、HPEサーバーに固有のものではありません。</p><p></p><p>このシステムROMのリビジョンには、CVE-2023-2650として文書化されているセキュリティ上の脆弱性を緩和するOpenSSLライブラリ1.0.2zhアップデートのリビジョンが含まれています。</p><p></p><p>言語が日本語または中国語に設定されている場合に、RBSUでiLO内蔵デバイスのヘルス情報に空白のコンテンツが表示される問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zh update which provides mitigation for security vulnerabilities documented as CVE-2023-2650.</p><p></p><p>Addressed an issue where iLO embedded device health info would display blank content under RBSU when the Language was set to Japanese or Chinese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zh update which provides mitigation for security vulnerabilities documented as CVE-2023-2650.</p><p></p><p>Addressed an issue where iLO embedded device health info would display blank content under RBSU when the Language was set to Japanese or Chinese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.80_04-20-2023" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-38087. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>Addressed the issue where the system might hang due to invalid memory free and usage when TPM is enabled.</p><p></p><p>Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203 does not populate in some cases.</p><p> </p><p>Addressed the issue where the power-on-password dialog popped up even though user did not set the password.</p><p></p><p>Addressed the issue where the TPM status between RBSU and iLO web pages was not synchronized.</p><p></p><p>Addressed the issue where BIOS does not correctly log memory error data and memory health telemetry in AHS.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-38087. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>Addressed the issue where the system might hang due to invalid memory free and usage when TPM is enabled.</p><p></p><p>Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203 does not populate in some cases.</p><p> </p><p>Addressed the issue where the power-on-password dialog popped up even though user did not set the password.</p><p></p><p>Addressed the issue where the TPM status between RBSU and iLO web pages was not synchronized.</p><p></p><p>Addressed the issue where BIOS does not correctly log memory error data and memory health telemetry in AHS.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2023.2ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題点:</strong></p><p>このシステムROMのリビジョンには、BIOSアドバイザリと、CVE-2022-38087として文書化されているセキュリティ上の脆弱性に対するインテルの緩和策を提供するインテルIPU 2023.2 BIOSアップデートの最新リビジョンが含まれています。このセキュリティ上の脆弱性は、CVEレポートサイトに記録されています。この問題は、HPEサーバーに固有のものではありません。</p><p></p><p>TPMが有効になっているときにメモリの空き容量と使用率が無効なためにシステムがハングする可能性がある問題に対処しました。</p><p></p><p>OEM SMBIOSタイプ203のPCIeデバイスのシリアル番号が入力されない場合がある問題に対処しました。</p><p> </p><p>ユーザーがパスワードを設定していない場合でも、電源投入時パスワードダイアログがポップアップ表示される問題に対処しました。</p><p></p><p>RBSUとiLO Webページ間のTPMステータスが同期されない問題に対処しました。</p><p></p><p>BIOSがAHSにメモリエラーデータとメモリヘルステレメトリを正しく記録しない問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし
        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-38087. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>Addressed the issue where the system might hang due to invalid memory free and usage when TPM is enabled.</p><p></p><p>Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203 does not populate in some cases.</p><p> </p><p>Addressed the issue where the power-on-password dialog popped up even though user did not set the password.</p><p></p><p>Addressed the issue where the TPM status between RBSU and iLO web pages was not synchronized.</p><p></p><p>Addressed the issue where BIOS does not correctly log memory error data and memory health telemetry in AHS.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-38087. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>Addressed the issue where the system might hang due to invalid memory free and usage when TPM is enabled.</p><p></p><p>Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203 does not populate in some cases.</p><p> </p><p>Addressed the issue where the power-on-password dialog popped up even though user did not set the password.</p><p></p><p>Addressed the issue where the TPM status between RBSU and iLO web pages was not synchronized.</p><p></p><p>Addressed the issue where BIOS does not correctly log memory error data and memory health telemetry in AHS.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.78_03-16-2023" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where servers may stop responding during boot when the Intel TXT function is enabled.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where servers may stop responding during boot when the Intel TXT function is enabled.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>なし<p><strong>ファームウェアの依存関係:</strong></p>なし
        <p><strong>修正された問題点：</strong></p><p>インテルTXT機能が有効になっている場合、起動中にサーバーが応答を停止することがある問題に対処しました。</p><p><strong>既知の問題点:</strong></p>なし
        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where servers may stop responding during boot when the Intel TXT function is enabled.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where servers may stop responding during boot when the Intel TXT function is enabled.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.76_02-09-2023" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added new System Configuration (RBSU) configuration options that allow enabling and disabling EPP (Energy Performance Preference) when “Workload Profile” sets to “Custom” and “Power Regulator” sets to “OS Control Mode”.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added new System Configuration (RBSU) configuration options that allow enabling and disabling EPP (Energy Performance Preference) when “Workload Profile” sets to “Custom” and “Power Regulator” sets to “OS Control Mode”.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>[ワークロードプロファイル]が[カスタム]に設定され、[パワーレギュレーター]が[OS制御モード]に設定されている場合にEPP（エネルギーパフォーマンス初期設定）を有効/無効にできる、システム構成（RBSU）の新しい構成オプションを追加しました。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added new System Configuration (RBSU) configuration options that allow enabling and disabling EPP (Energy Performance Preference) when “Workload Profile” sets to “Custom” and “Power Regulator” sets to “OS Control Mode”.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added new System Configuration (RBSU) configuration options that allow enabling and disabling EPP (Energy Performance Preference) when “Workload Profile” sets to “Custom” and “Power Regulator” sets to “OS Control Mode”.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the zlib library 1.2.13 update which provides mitigation for and security vulnerabilities documented as CVE-2022-37434. This issue is not unique to HPE servers.</p><p></p><p>Addressed an issue that system will hang when BIOS tries to print a large IML message on POST screen.</p><p></p><p>Addressed an issue when system discovers thousands of LUNs and was trying to create thousands of boot options for each LUNs. System cannot add, delete or adjust new boot options on iLO web and RBSU after rebooting. System becomes unstable unless loading manufacture default.</p><p></p><p>Addressed an issue where some Chinese and Japanese translations were missing in RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the zlib library 1.2.13 update which provides mitigation for and security vulnerabilities documented as CVE-2022-37434. This issue is not unique to HPE servers.</p><p></p><p>Addressed an issue that system will hang when BIOS tries to print a large IML message on POST screen.</p><p></p><p>Addressed an issue when system discovers thousands of LUNs and was trying to create thousands of boot options for each LUNs. System cannot add, delete or adjust new boot options on iLO web and RBSU after rebooting. System becomes unstable unless loading manufacture default.</p><p></p><p>Addressed an issue where some Chinese and Japanese translations were missing in RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2023.1ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題点:</strong></p><p>このシステムROMのリビジョンには、BIOSアドバイザリと、CVE-2022-32231およびCVE-2022-26343として文書化されているセキュリティ上の脆弱性に対するインテルの緩和策を提供するインテルIPU 2023.1 BIOSアップデートの最新リビジョンが含まれています。このセキュリティ上の脆弱性は、CVEレポートサイトに記録されています。この問題は、HPEサーバーに固有のものではありません。</p><p></p><p>このシステムROMのリビジョンには、CVE-2022-37434として文書化されているセキュリティ上の脆弱性を緩和するzlibライブラリ1.2.13アップデートのリビジョンが含まれています。この問題は、HPEサーバーに固有のものではありません。</p><p></p><p>BIOSがサイズの大きいIMLメッセージをPOST画面に出力しようとしたときにシステムがハングする問題に対処しました。</p><p></p><p>システムが数千のLUNを検出し、LUNごとに数千のブートオプションを作成しようとした際の問題に対処しました。システムの再起動後に、iLO WebおよびRBSUで新しいブートオプションを追加、削除、または調整することはできません。製造時のデフォルトを読み込まないとシステムが不安定になります。</p><p></p><p>RBSUで一部の中国語と日本語の翻訳が欠落している問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし
        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the zlib library 1.2.13 update which provides mitigation for and security vulnerabilities documented as CVE-2022-37434. This issue is not unique to HPE servers.</p><p></p><p>Addressed an issue that system will hang when BIOS tries to print a large IML message on POST screen.</p><p></p><p>Addressed an issue when system discovers thousands of LUNs and was trying to create thousands of boot options for each LUNs. System cannot add, delete or adjust new boot options on iLO web and RBSU after rebooting. System becomes unstable unless loading manufacture default.</p><p></p><p>Addressed an issue where some Chinese and Japanese translations were missing in RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the zlib library 1.2.13 update which provides mitigation for and security vulnerabilities documented as CVE-2022-37434. This issue is not unique to HPE servers.</p><p></p><p>Addressed an issue that system will hang when BIOS tries to print a large IML message on POST screen.</p><p></p><p>Addressed an issue when system discovers thousands of LUNs and was trying to create thousands of boot options for each LUNs. System cannot add, delete or adjust new boot options on iLO web and RBSU after rebooting. System becomes unstable unless loading manufacture default.</p><p></p><p>Addressed an issue where some Chinese and Japanese translations were missing in RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.72_09-29-2022" revision="" type_of_change="0"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated Intel Optane Memory UEFI driver.</p><p></p><p>Added support to show manufacturing date for DIMMs in SMBIOS.</p><p></p><p>Improved the description of Memory Failed Events in the Integrated Management Log (IML).</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated Intel Optane Memory UEFI driver.</p><p></p><p>Added support to show manufacturing date for DIMMs in SMBIOS.</p><p></p><p>Improved the description of Memory Failed Events in the Integrated Management Log (IML).</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>インテルOptaneメモリUEFIドライバーをアップデートしました。</p><p></p><p>SMBIOSでDIMMの製造日を表示するためのサポートが追加されました。</p><p></p><p>インテグレーテッドマネジメントログ（IML）内のメモリの障害イベントの説明を改善しました。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated Intel Optane Memory UEFI driver.</p><p></p><p>Added support to show manufacturing date for DIMMs in SMBIOS.</p><p></p><p>Improved the description of Memory Failed Events in the Integrated Management Log (IML).</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated Intel Optane Memory UEFI driver.</p><p></p><p>Added support to show manufacturing date for DIMMs in SMBIOS.</p><p></p><p>Improved the description of Memory Failed Events in the Integrated Management Log (IML).</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where a server running the ESXi hypervisor a with TPM module installed would halt on loading modules after the installation of the hypervisor OS, with the message "TPM log extend failed".</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where a server running the ESXi hypervisor a with TPM module installed would halt on loading modules after the installation of the hypervisor OS, with the message "TPM log extend failed".</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2022.3ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題点：</strong></p><p>TPMモジュールがインストールされていてESXiハイパーバイザーが実行されているサーバーが、ハイパーバイザーOSのインストール後、モジュールのロード中に停止し、"TPM log extend failed"というメッセージが表示される問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where a server running the ESXi hypervisor a with TPM module installed would halt on loading modules after the installation of the hypervisor OS, with the message "TPM log extend failed".</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where a server running the ESXi hypervisor a with TPM module installed would halt on loading modules after the installation of the hypervisor OS, with the message "TPM log extend failed".</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.68_07-14-2022" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for One Button Secure Erase (OBSE) and encryption for Broadcom MR controller series on Intel Gen10 systems.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for One Button Secure Erase (OBSE) and encryption for Broadcom MR controller series on Intel Gen10 systems.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for One Button Secure Erase (OBSE) and encryption for Broadcom MR controller series on Intel Gen10 systems.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for One Button Secure Erase (OBSE) and encryption for Broadcom MR controller series on Intel Gen10 systems.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for One Button Secure Erase (OBSE) and encryption for Broadcom MR controller series on Intel Gen10 systems.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the warning message &quot;Component Not Signed&quot; might be displayed for SHA-384 signed components. This issue will be resolved in a future version of SUM. For details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00125612en_us.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of openSSL which provides mitigation for BIOS security vulnerability documented as CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of FreeType library which provides mitigations for security vulnerabilities documented as CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system will hang with Red Screen of Death (RSOD) in ROM Based Setup Utility (RBSU) when user tries to switch [Image Description] choices for NVMe devices under the Firmware Update Page.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the warning message &quot;Component Not Signed&quot; might be displayed for SHA-384 signed components. This issue will be resolved in a future version of SUM. For details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00125612en_us.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of openSSL which provides mitigation for BIOS security vulnerability documented as CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of FreeType library which provides mitigations for security vulnerabilities documented as CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system will hang with Red Screen of Death (RSOD) in ROM Based Setup Utility (RBSU) when user tries to switch [Image Description] choices for NVMe devices under the Firmware Update Page.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the warning message &quot;Component Not Signed&quot; might be displayed for SHA-384 signed components. This issue will be resolved in a future version of SUM. For details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00125612en_us.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of openSSL which provides mitigation for BIOS security vulnerability documented as CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of FreeType library which provides mitigations for security vulnerabilities documented as CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system will hang with Red Screen of Death (RSOD) in ROM Based Setup Utility (RBSU) when user tries to switch [Image Description] choices for NVMe devices under the Firmware Update Page.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the warning message &quot;Component Not Signed&quot; might be displayed for SHA-384 signed components. This issue will be resolved in a future version of SUM. For details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00125612en_us.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of openSSL which provides mitigation for BIOS security vulnerability documented as CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of FreeType library which provides mitigations for security vulnerabilities documented as CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system will hang with Red Screen of Death (RSOD) in ROM Based Setup Utility (RBSU) when user tries to switch [Image Description] choices for NVMe devices under the Firmware Update Page.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the warning message &quot;Component Not Signed&quot; might be displayed for SHA-384 signed components. This issue will be resolved in a future version of SUM. For details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00125612en_us.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of openSSL which provides mitigation for BIOS security vulnerability documented as CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of FreeType library which provides mitigations for security vulnerabilities documented as CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system will hang with Red Screen of Death (RSOD) in ROM Based Setup Utility (RBSU) when user tries to switch [Image Description] choices for NVMe devices under the Firmware Update Page.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.66_05-17-2022" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of openSSL and LibPng which provides mitigation for BIOS security vulnerabilities documented as CVE-2022-1292 and CVE-2019-7317.  This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue of an incomplete mitigation for a BIOS advisory and security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and CVE-2021-33124.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of openSSL and LibPng which provides mitigation for BIOS security vulnerabilities documented as CVE-2022-1292 and CVE-2019-7317.  This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue of an incomplete mitigation for a BIOS advisory and security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and CVE-2021-33124.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、Intel Platform Update (IPU)バージョンIPU.2022.1ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし        <p><strong>修正された問題点：</strong></p><p>このシステムROMのリビジョンには、CVE-2022-1292およびCVE-2019-7317として文書化されているBIOSセキュリティ脆弱性を緩和するopenSSLおよびLibPngの最新リビジョンが含まれています。このセキュリティ上の脆弱性は、CVEレポートサイトに記録されています。この問題は、HPEサーバーに固有のものではありません。</p><p>BIOSアドバイザリと、CVE-2021-0159、CVE-2021-33123、CVE-2021-33124として記録されているセキュリティ脆弱性の緩和が不完全である問題に対処しました。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-00601 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p><p><strong>既知の問題点：</strong></p>なし        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of openSSL and LibPng which provides mitigation for BIOS security vulnerabilities documented as CVE-2022-1292 and CVE-2019-7317.  This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue of an incomplete mitigation for a BIOS advisory and security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and CVE-2021-33124.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of openSSL and LibPng which provides mitigation for BIOS security vulnerabilities documented as CVE-2022-1292 and CVE-2019-7317.  This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue of an incomplete mitigation for a BIOS advisory and security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and CVE-2021-33124.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.64_04-21-2022" revision="B" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.64_04-21-2022(B) contains updates to the firmware packaging and is functionally equivalent to ver. 2.64_04-21-2022. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 2.64_04-21-2022.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032. This issue is not unique to HPE servers.</p>

<p>Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p>

<p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p>

<p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode.</p>

<p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p>

<p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62. For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.64_04-21-2022(B) contains updates to the firmware packaging and is functionally equivalent to ver. 2.64_04-21-2022. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 2.64_04-21-2022.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032. This issue is not unique to HPE servers.</p>

<p>Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p>

<p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p>

<p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode.</p>

<p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p>

<p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62. For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>バージョン2.64_04-21-2022(B)にはファームウェアパッケージのアップデートが含まれており、機能的にはバージョン2.64_04-21-2022と同等です。ファームウェアをバージョン2.64_04-21-2022にアップグレードするために以前のリビジョンのコンポーネントが使われた場合は、リビジョン(B)にアップグレードする必要はありません。</p>

<p>このバージョンのシステムROMには、Intel Platform Update (IPU)バージョンIPU.2022.1ガイダンスに沿ったアップデートが含まれています。</p>

<p><strong>ファームウェアの依存関係：</strong></p>

<p>なし        </p>

<p><strong>修正された問題点：</strong></p>

<p>このシステムROMのリビジョンには、CVE-2022-21166およびCVE-2021-21131として文書化されたセキュリティ上の脆弱性に対する緩和策を提供するインテル製マイクロコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-00616 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMのリビジョンには、CVE-2021-0189、CVE-2021-0159、CVE-2021-33123、CVE-2021-33124、およびCVE-2021-33159として文書化されたBIOSアドバイザリおよびセキュリティ上の脆弱性に対する緩和策を提供するインテルリファレンスコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリ INTEL-SA-00601 および INTEL-SA-00610 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMのリビジョンには、CVE-2018-25032として文書化されたセキュリティ上の脆弱性に対する緩和策を提供するzlibライブラリの最新リビジョンが含まれています。この問題は、HPEサーバーに固有のものではありません。</p>

<p>ROMベースセットアップユーティリティ（RBSU）の言語設定が英語以外の場合に、システムROMにストレージコントローラーの製品名が表示されない問題に対処します。</p>

<p>ウォッチドッグタイマーがタイムアウトすると、システムが再起動でループする問題に対処します。</p>

<p>アドバンストメモリプロテクション（AMP）でアドバンストECCが選択されている問題に対処します。このオプションは、カスタムワークロードモードの場合に強制的にHPEファーストフォルトトレラント（ADDDC）になります。</p>

<p>カスタムワークロードモードでアドバンストメモリプロテクション（AMP）モードを設定できる問題に対処します。</p>

<p>システムROMをバージョン2.60から2.62にアップデートした後、アドバンストメモリプロテクション（AMP）モードがADDDCに戻らない問題に対処します。詳細については、次のアドバイザリを参照してください。https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p>

<p><strong>既知の問題点：</strong></p>

<p>なし        </p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.64_04-21-2022(B) contains updates to the firmware packaging and is functionally equivalent to ver. 2.64_04-21-2022. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 2.64_04-21-2022.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032. This issue is not unique to HPE servers.</p>

<p>Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p>

<p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p>

<p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode.</p>

<p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p>

<p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62. For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.64_04-21-2022(B) contains updates to the firmware packaging and is functionally equivalent to ver. 2.64_04-21-2022. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 2.64_04-21-2022.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032. This issue is not unique to HPE servers.</p>

<p>Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p>

<p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p>

<p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode.</p>

<p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p>

<p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62. For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.64_04-21-2022" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032.  This issue is not unique to HPE servers.</p><p>
Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p><p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p><p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode. </p><p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p><p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62.  For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032.  This issue is not unique to HPE servers.</p><p>
Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p><p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p><p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode. </p><p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p><p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62.  For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2022.1ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし        <p><strong>修正された問題点：</strong></p><p>このシステムROMのリビジョンには、CVE-2022-21166およびCVE-2021-21131として文書化されたセキュリティ上の脆弱性に対する緩和策を提供するインテル製マイクロコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-00616 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p><p>このシステムROMのリビジョンには、CVE-2021-0189、CVE-2021-0159、CVE-2021-33123、CVE-2021-33124、およびCVE-2021-33159として文書化されたBIOSアドバイザリおよびセキュリティ上の脆弱性に対する緩和策を提供するインテルリファレンスコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリ INTEL-SA-00601 および INTEL-SA-00610 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p><p>このシステムROMのリビジョンには、CVE-2018-25032として文書化されたセキュリティ上の脆弱性に対する緩和策を提供するzlibライブラリの最新リビジョンが含まれています。この問題は、HPEサーバーに固有のものではありません。</p><p>
ROMベースセットアップユーティリティ（RBSU）の言語設定が英語以外の場合に、システムROMにストレージコントローラーの製品名が表示されない問題に対処します。</p><p>ウォッチドッグタイマーがタイムアウトすると、システムが再起動でループする問題に対処します。</p><p>アドバンストメモリプロテクション（AMP）でアドバンストECCが選択されている問題に対処します。このオプションは、カスタムワークロードモードの場合に強制的にHPEファーストフォルトトレラント（ADDDC）になります。</p><p>カスタムワークロードモードでアドバンストメモリプロテクション（AMP）モードを設定できる問題に対処します。</p><p>システムROMをバージョン2.60から2.62にアップデートした後、アドバンストメモリプロテクション（AMP）モードがADDDCに戻らない問題に対処します。詳細については、次のアドバイザリを参照してください。https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p><p><strong>既知の問題点：</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032.  This issue is not unique to HPE servers.</p><p>
Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p><p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p><p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode. </p><p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p><p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62.  For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032.  This issue is not unique to HPE servers.</p><p>
Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p><p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p><p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode. </p><p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p><p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62.  For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.62_03-08-2022" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This System ROM should be considered Critical for any systems using the v2.60 revision of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the Advanced Memory Protection (AMP) mode was incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode after updating to Sysrom ROM 01/13/2022 v2.60.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This System ROM should be considered Critical for any systems using the v2.60 revision of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the Advanced Memory Protection (AMP) mode was incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode after updating to Sysrom ROM 01/13/2022 v2.60.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>このシステムROMは、システムROMのv2.60リビジョンを使用するシステムにとってクリティカルと見なされます。<p><strong>ファームウェアの依存関係:</strong></p>なし  <p><strong>修正された問題点：</strong></p><p>システムROM 01/13/2022 v2.60にアップデートした後、HPEファーストフォルトトレラント（ADDDC）モードのアドバンストECCにアドバンストメモリプロテクション（AMP）モードが誤って強制される問題に対処しました。</p><p><strong>既知の問題点:</strong></p>なし  ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This System ROM should be considered Critical for any systems using the v2.60 revision of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the Advanced Memory Protection (AMP) mode was incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode after updating to Sysrom ROM 01/13/2022 v2.60.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This System ROM should be considered Critical for any systems using the v2.60 revision of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the Advanced Memory Protection (AMP) mode was incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode after updating to Sysrom ROM 01/13/2022 v2.60.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.60_01-13-2022" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides BIOS mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues are not unique to HPE servers. </p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides Authenticated Code Module (ACM) mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099, CVE-2021-0103,
CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124. These issues are not unique to HPE servers.</p><p>Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently and may log the following System Overheating message in the Integrated Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles installation."</p><p>Addressed an issue where the system may not automatically restart due to a hang condition during the boot process after a cold boot when the IPMI Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides BIOS mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues are not unique to HPE servers. </p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides Authenticated Code Module (ACM) mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099, CVE-2021-0103,
CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124. These issues are not unique to HPE servers.</p><p>Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently and may log the following System Overheating message in the Integrated Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles installation."</p><p>Addressed an issue where the system may not automatically restart due to a hang condition during the boot process after a cold boot when the IPMI Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides BIOS mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues are not unique to HPE servers. </p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides Authenticated Code Module (ACM) mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099, CVE-2021-0103,
CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124. These issues are not unique to HPE servers.</p><p>Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently and may log the following System Overheating message in the Integrated Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles installation."</p><p>Addressed an issue where the system may not automatically restart due to a hang condition during the boot process after a cold boot when the IPMI Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides BIOS mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues are not unique to HPE servers. </p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides Authenticated Code Module (ACM) mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099, CVE-2021-0103,
CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124. These issues are not unique to HPE servers.</p><p>Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently and may log the following System Overheating message in the Integrated Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles installation."</p><p>Addressed an issue where the system may not automatically restart due to a hang condition during the boot process after a cold boot when the IPMI Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides BIOS mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues are not unique to HPE servers. </p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides Authenticated Code Module (ACM) mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099, CVE-2021-0103,
CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124. These issues are not unique to HPE servers.</p><p>Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently and may log the following System Overheating message in the Integrated Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles installation."</p><p>Addressed an issue where the system may not automatically restart due to a hang condition during the boot process after a cold boot when the IPMI Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.58_11-24-2021" revision="" type_of_change="2"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue that can result in Corrected Memory Error Threshold Events being logged to the Integrated Management Log (IML) incorrectly.  The system monitors corrected memory errors and notifies the user via a Corrected Memory Error Threshold Event when action is recommended due to an increased risk of an uncorrected memory error.  Previous versions of the System ROM may log a Corrected Memory Error Threshold Event in cases where the system is not at an increased risk of an uncorrected memory error.  It is strongly recommended that the System ROM be updated to this version or later before replacing DIMMs due to Corrected Memory Error Threshold Events.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue that can result in Corrected Memory Error Threshold Events being logged to the Integrated Management Log (IML) incorrectly.  The system monitors corrected memory errors and notifies the user via a Corrected Memory Error Threshold Event when action is recommended due to an increased risk of an uncorrected memory error.  Previous versions of the System ROM may log a Corrected Memory Error Threshold Event in cases where the system is not at an increased risk of an uncorrected memory error.  It is strongly recommended that the System ROM be updated to this version or later before replacing DIMMs due to Corrected Memory Error Threshold Events.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>なし<p><strong>ファームウェアの依存関係：</strong></p>なし        <p><strong>修正された問題:</strong></p><p>訂正済みメモリエラーしきい値イベントがインテグレーテッドマネジメントログ（IML）に記録される可能性がある問題に対処しました。修正されたメモリーエラーを監視し、未修正のメモリーエラーのリスクが高まるため対処が推奨される場合、Corrected Memory Error Threshold Eventを通じてユーザーに通知します。システムROMの以前のバージョンでは、システムが未修正のメモリエラーのリスクが高くない場合に、修正済みメモリエラーしきい値イベントをログに記録することがあります。訂正済みメモリエラーしきい値イベントのためにDIMMを交換する前に、システムROMをこのバージョンまたはそれ以降にアップデートすることを強くお勧めします。</p><p><strong>既知の問題点:</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue that can result in Corrected Memory Error Threshold Events being logged to the Integrated Management Log (IML) incorrectly.  The system monitors corrected memory errors and notifies the user via a Corrected Memory Error Threshold Event when action is recommended due to an increased risk of an uncorrected memory error.  Previous versions of the System ROM may log a Corrected Memory Error Threshold Event in cases where the system is not at an increased risk of an uncorrected memory error.  It is strongly recommended that the System ROM be updated to this version or later before replacing DIMMs due to Corrected Memory Error Threshold Events.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue that can result in Corrected Memory Error Threshold Events being logged to the Integrated Management Log (IML) incorrectly.  The system monitors corrected memory errors and notifies the user via a Corrected Memory Error Threshold Event when action is recommended due to an increased risk of an uncorrected memory error.  Previous versions of the System ROM may log a Corrected Memory Error Threshold Event in cases where the system is not at an increased risk of an uncorrected memory error.  It is strongly recommended that the System ROM be updated to this version or later before replacing DIMMs due to Corrected Memory Error Threshold Events.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.56_10-28-2021" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2021-0157. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0562. The Intel microcode patch included in this release is version 0x05003208 (CPUID 50567).   These issues impacts 2nd Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation Intel Xeon Scalable Processors. These issues are not unique to HPE servers.</p><p>Addressed an issue in which a server may fail to boot and experience a Machine Check Exception indicating "x64 Exception type 0x12:  An uncorrectable machine check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is installed.</p><p>Addressed an issue where servers with an HPE NS204i-p OS Boot Device may shutdown and log a "System Overheating" error message in the Integrated Management Log (IML).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2021-0157. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0562. The Intel microcode patch included in this release is version 0x05003208 (CPUID 50567).   These issues impacts 2nd Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation Intel Xeon Scalable Processors. These issues are not unique to HPE servers.</p><p>Addressed an issue in which a server may fail to boot and experience a Machine Check Exception indicating "x64 Exception type 0x12:  An uncorrectable machine check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is installed.</p><p>Addressed an issue where servers with an HPE NS204i-p OS Boot Device may shutdown and log a "System Overheating" error message in the Integrated Management Log (IML).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>なし<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題:</strong></p><p>このシステムROMのリビジョンには、CVE-2021-0157 として文書化されているセキュリティ上の脆弱性に対する緩和策を提供するインテル製マイクロコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-0562 に文書化されています。このリリースに含まれているインテル製マイクロコードパッチは、バージョン0x05003208 (CPUID 50567)です。この問題は、第2世代のインテルXeonスケーラブルプロセッサーに影響します。これらは、第1世代のインテルXeonスケーラブルプロセッサーには影響しません。これらの問題は、HPEサーバーに固有のものではありません。</p><p>サーバーの起動に失敗し、「x64 Exception type 0x12」というMachine Check Exceptionが発生することがあるという問題に対処しました。Fastcom SuperFSCC/4 PCIeカードが取り付けられているときに、CPU1で修正不可能なマシンチェック例外が発生しました。</p><p>HPE NS204i-p OSブートデバイスを搭載したサーバーがシャットダウンし、インテグレーテッドマネジメントログ（IML）に「System Overheating」エラーメッセージが記録される可能性がある問題に対処しました。</p><p><strong>既知の問題点:</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2021-0157. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0562. The Intel microcode patch included in this release is version 0x05003208 (CPUID 50567).   These issues impacts 2nd Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation Intel Xeon Scalable Processors. These issues are not unique to HPE servers.</p><p>Addressed an issue in which a server may fail to boot and experience a Machine Check Exception indicating "x64 Exception type 0x12:  An uncorrectable machine check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is installed.</p><p>Addressed an issue where servers with an HPE NS204i-p OS Boot Device may shutdown and log a "System Overheating" error message in the Integrated Management Log (IML).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2021-0157. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0562. The Intel microcode patch included in this release is version 0x05003208 (CPUID 50567).   These issues impacts 2nd Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation Intel Xeon Scalable Processors. These issues are not unique to HPE servers.</p><p>Addressed an issue in which a server may fail to boot and experience a Machine Check Exception indicating "x64 Exception type 0x12:  An uncorrectable machine check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is installed.</p><p>Addressed an issue where servers with an HPE NS204i-p OS Boot Device may shutdown and log a "System Overheating" error message in the Integrated Management Log (IML).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.54_09-03-2021" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Uncorrectable Memory Errors may be reported and logged to the Integrated Management Log (IML) with certain DIMMs installed and the RBSU &quot;Extended Memory Test&quot; option enabled after updating the System ROM to v2.50 or later.&nbsp;The &ldquo;Extended Memory Test&rdquo; option is disabled by default and this issue would only impact customers who had specifically configured this option to enabled.&nbsp;The reported Uncorrected Memory Errors were due to an issue with the impacted System ROM revisions and do NOT indicate an issue with the DIMMs themselves.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Uncorrectable Memory Errors may be reported and logged to the Integrated Management Log (IML) with certain DIMMs installed and the RBSU &quot;Extended Memory Test&quot; option enabled after updating the System ROM to v2.50 or later.&nbsp;The &ldquo;Extended Memory Test&rdquo; option is disabled by default and this issue would only impact customers who had specifically configured this option to enabled.&nbsp;The reported Uncorrected Memory Errors were due to an issue with the impacted System ROM revisions and do NOT indicate an issue with the DIMMs themselves.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>なし</p>

<p><strong>ファームウェアの依存関係:</strong></p>

<p>なし        </p>

<p><strong>修正された問題：</strong></p>

<p>システムROMをv2.50以降にアップデートした後、特定のDIMMが取り付けられ、RBSUの「拡張メモリテスト」オプションが有効になっていると、修正不可能なメモリエラーが報告されてインテグレーテッドマネージメントログ（IML）に記録される可能性がある問題に対処しました。 「拡張メモリテスト」オプションはデフォルトで無効になっており、この問題は、このオプションを有効に設定したお客様にのみ影響します。 報告された未修正メモリエラーは、影響を受けるシステムROMリビジョンの問題によるものであり、DIMM自体の問題を示すものではありません。</p>

<p><strong>既知の問題点:</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Uncorrectable Memory Errors may be reported and logged to the Integrated Management Log (IML) with certain DIMMs installed and the RBSU &quot;Extended Memory Test&quot; option enabled after updating the System ROM to v2.50 or later.&nbsp;The &ldquo;Extended Memory Test&rdquo; option is disabled by default and this issue would only impact customers who had specifically configured this option to enabled.&nbsp;The reported Uncorrected Memory Errors were due to an issue with the impacted System ROM revisions and do NOT indicate an issue with the DIMMs themselves.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Uncorrectable Memory Errors may be reported and logged to the Integrated Management Log (IML) with certain DIMMs installed and the RBSU &quot;Extended Memory Test&quot; option enabled after updating the System ROM to v2.50 or later.&nbsp;The &ldquo;Extended Memory Test&rdquo; option is disabled by default and this issue would only impact customers who had specifically configured this option to enabled.&nbsp;The reported Uncorrected Memory Errors were due to an issue with the impacted System ROM revisions and do NOT indicate an issue with the DIMMs themselves.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.52_07-08-2021" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added Custom time server PCI riser support.</p>
]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added Custom time server PCI riser support.</p>
]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>カスタムタイムサーバーのPCIライザーのサポートが追加されました。</p>
]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added Custom time server PCI riser support.</p>
]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added Custom time server PCI riser support.</p>
]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet 10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows “null string” in RBSU system information page.</p><p>This revision of the System ROM includes the EDK2 patches which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.</p><p>Addressed an issue where the memory channel numbering is incorrect for Correctable Memory Errors.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet 10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows “null string” in RBSU system information page.</p><p>This revision of the System ROM includes the EDK2 patches which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.</p><p>Addressed an issue where the memory channel numbering is incorrect for Correctable Memory Errors.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>なし<p><strong>ファームウェアの依存関係:</strong></p> なし<p><strong>修正された問題：</strong></p><p>HPE InfiniBand FDR/Ethernet 10Gb/40Gb2ポート544FLR-QSFPアダプターの2番目のポートがRBSUシステム情報ページに「null文字列」を表示する問題に対処しました。</p><p>このシステムROMのリビジョンには、EDK2パッチが含まれており、BIOSアドバイザリおよびCVE-2019-14584、CVE-2021-28211、CVE-2021-28210として文書化されているセキュリティ上の脆弱性に対する緩和策が提供されています。</p><p>修正可能なメモリエラーのメモリチャネル番号が正しくない問題に対処しました。</p><p><strong>既知の問題点:</strong></p>なし
        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet 10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows “null string” in RBSU system information page.</p><p>This revision of the System ROM includes the EDK2 patches which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.</p><p>Addressed an issue where the memory channel numbering is incorrect for Correctable Memory Errors.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet 10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows “null string” in RBSU system information page.</p><p>This revision of the System ROM includes the EDK2 patches which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.</p><p>Addressed an issue where the memory channel numbering is incorrect for Correctable Memory Errors.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.50_05-24-2021" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option to Server Availability called IPMI Watchdog Timer. When enabled, the system will start an IPMI based watchdog timer during boot which can be used to protect against a boot hang or other unexpected system boot issue. It is the responsibility of the user to disable the IPMI watchdog timer once the operating system has booted. Failure to disable the timer can result in an unexpected server reset or shutdown. </p><p>Added a new BIOS/Platform Configuration (RBSU) option to Server Security called UEFI Variable Access Firmware Control. This option, when enabled, can be used to block UEFI Variable writes, such as to the UEFI Boot Order, from the Operating System or a third-party utility. HPE recommends leaving this capability disabled unless the user specifically wants to prevent the operating system's normal operation of writing to UEFI Variables, which typically occur during OS install.</p><p>Updated the BIOS TPM 1.2 support for Windows 2022.</p><p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option to Server Availability called IPMI Watchdog Timer. When enabled, the system will start an IPMI based watchdog timer during boot which can be used to protect against a boot hang or other unexpected system boot issue. It is the responsibility of the user to disable the IPMI watchdog timer once the operating system has booted. Failure to disable the timer can result in an unexpected server reset or shutdown. </p><p>Added a new BIOS/Platform Configuration (RBSU) option to Server Security called UEFI Variable Access Firmware Control. This option, when enabled, can be used to block UEFI Variable writes, such as to the UEFI Boot Order, from the Operating System or a third-party utility. HPE recommends leaving this capability disabled unless the user specifically wants to prevent the operating system's normal operation of writing to UEFI Variables, which typically occur during OS install.</p><p>Updated the BIOS TPM 1.2 support for Windows 2022.</p><p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>IPMIウォッチドッグタイマーと呼ばれる新しいBIOS/プラットフォーム構成（RBSU）オプションがサーバーの可用性に追加されました。有効にすると、システムはブート中にIPMIベースのウォッチドッグタイマーを開始します。これは、ブートハングやその他の予期しないシステムブートの問題から保護するために使用できます。オペレーティングシステムが起動したら、ユーザーの責任でIPMIウォッチドッグタイマーを無効にする必要があります。タイマーを無効にしないと、予期しないサーバーのリセットまたはシャットダウンが発生する可能性があります。</p><p>UEFI可変アクセスファームウェア制御と呼ばれる新しいBIOS/プラットフォーム構成（RBSU）オプションをサーバーセキュリティに追加しました。このオプションを有効にすると、オペレーティングシステムまたはサードパーティユーティリティからのUEFIブート順序などへのUEFI変数の書き込みをブロックするために使用できます。HPEは、通常ではOSインストール時に発生するUEFI変数への書き込みというオペレーティングシステムの通常動作を特に防ぐ場合を除き、この機能を無効にしておくことをお勧めしています。</p><p>Windows 2022の BIOS TPM 1.2サポートをアップデートしました。</p><p>最新のBIOS/プラットフォーム構成オプションと一致するようにHPE RESTful API HPE BIOS属性レジストリリソースをアップデートしました。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option to Server Availability called IPMI Watchdog Timer. When enabled, the system will start an IPMI based watchdog timer during boot which can be used to protect against a boot hang or other unexpected system boot issue. It is the responsibility of the user to disable the IPMI watchdog timer once the operating system has booted. Failure to disable the timer can result in an unexpected server reset or shutdown. </p><p>Added a new BIOS/Platform Configuration (RBSU) option to Server Security called UEFI Variable Access Firmware Control. This option, when enabled, can be used to block UEFI Variable writes, such as to the UEFI Boot Order, from the Operating System or a third-party utility. HPE recommends leaving this capability disabled unless the user specifically wants to prevent the operating system's normal operation of writing to UEFI Variables, which typically occur during OS install.</p><p>Updated the BIOS TPM 1.2 support for Windows 2022.</p><p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option to Server Availability called IPMI Watchdog Timer. When enabled, the system will start an IPMI based watchdog timer during boot which can be used to protect against a boot hang or other unexpected system boot issue. It is the responsibility of the user to disable the IPMI watchdog timer once the operating system has booted. Failure to disable the timer can result in an unexpected server reset or shutdown. </p><p>Added a new BIOS/Platform Configuration (RBSU) option to Server Security called UEFI Variable Access Firmware Control. This option, when enabled, can be used to block UEFI Variable writes, such as to the UEFI Boot Order, from the Operating System or a third-party utility. HPE recommends leaving this capability disabled unless the user specifically wants to prevent the operating system's normal operation of writing to UEFI Variables, which typically occur during OS install.</p><p>Updated the BIOS TPM 1.2 support for Windows 2022.</p><p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.

HPE recommends that customers using Intel Optane Persistent Memory update to this version of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system may experience an Unexpected Shutdown or a Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only impacts systems configured with Intel Optane DC Persistent Memory in one of these modes. HPE recommends updating to this version of the System ROM for any customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed Mode. This issue is not unique to HPE servers. </p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-24511. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-464. The Intel microcode patches included in this release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567). These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and CVE-2020-24486. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00463.  These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which address various functional issues documented in the Intel Technical Specification update. These issues are documented as the EIBRS Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not unique to HPE servers.</p><p>Addressed an issue where the server may become unresponsive during POST or take an unexpected long time to complete POST when the RBSU Extended Memory Test option was enabled. </p><p>Addressed an issue where the server was allowed to boot when mixed SKUs of Intel Xeon Scalable Processors are installed.  The server should display an error message and halt boot in these configurations.</p><p>Addressed an issue where the System ROM was logging a mismatched power supply condition with the latest version of the HPE Power Supplies. When this issue occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or later is also needed.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.

HPE recommends that customers using Intel Optane Persistent Memory update to this version of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system may experience an Unexpected Shutdown or a Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only impacts systems configured with Intel Optane DC Persistent Memory in one of these modes. HPE recommends updating to this version of the System ROM for any customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed Mode. This issue is not unique to HPE servers. </p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-24511. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-464. The Intel microcode patches included in this release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567). These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and CVE-2020-24486. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00463.  These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which address various functional issues documented in the Intel Technical Specification update. These issues are documented as the EIBRS Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not unique to HPE servers.</p><p>Addressed an issue where the server may become unresponsive during POST or take an unexpected long time to complete POST when the RBSU Extended Memory Test option was enabled. </p><p>Addressed an issue where the server was allowed to boot when mixed SKUs of Intel Xeon Scalable Processors are installed.  The server should display an error message and halt boot in these configurations.</p><p>Addressed an issue where the System ROM was logging a mismatched power supply condition with the latest version of the HPE Power Supplies. When this issue occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or later is also needed.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2021.1ガイダンスに沿ったアップデートが含まれています。HPEは、Intel Optane Persistent Memoryを使用しているお客様が、このバージョンのシステムROMにアップデートすることを推奨しています。<p><strong>ファームウェアの依存関係:</strong></p> なし<p><strong>修正された問題：</strong></p><p>Intel Optane DC Persistent Memoryがインストールされ、メモリモード（2LM）または混合モード用に構成されていると、システムで予期しないシャットダウンが発生するか、バンク4またはバンク6のマシンチェックが発生する可能性がある問題に対処しました。この問題は、これらのモードのいずれかでIntel Optane DC Persistent Memoryが構成されているシステムにのみ影響します。HPEは、Intel Optane DC Persistent Memoryをメモリモード（2LM）または混合モードで使用しているすべてのお客様に、このバージョンのシステムROMにアップデートすることを推奨します。この問題は、HPEサーバーに固有のものではありません。</p><p>このシステムROMのリビジョンには、CVE-2020-24511 として文書化されているセキュリティ上の脆弱性に対する緩和策を提供するインテル製マイクロコードの最新リビジョンが含まれています。これらのセキュリティ脆弱性は、Intel Security Advisory INTEL-SA-464に文書化されています。このリリースに含まれているインテル製マイクロコードパッチは、バージョン0x02006B06（CPUID 50654）および0x05003103（CPUID 50567）です。これらの問題は、HPEサーバーに固有のものではありません。</p><p>このシステムROMのリビジョンには、CVE-2020-12358、CVE-2020-12360およびCVE-2020-24486として文書化されたBIOSアドバイザリおよびセキュリティ上の脆弱性の緩和を提供するインテルリファレンスコードの最新リビジョンが含まれています。これらのセキュリティ脆弱性は、Intel Security Advisory INTEL-SA-00463に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p><p>このシステムROMのリビジョンには、インテルテクニカルスペックアップデートに記載されているさまざまな機能問題に対処するインテル製マイクロコードの最新リビジョンが含まれています。これらの問題は、EIBRS Guest/Host and REP MOVS* MCE on Memory Not Access Issueとしてドキュメント化されています。これらの問題は、HPEサーバーに固有のものではありません。</p><p>RBSU拡張メモリテストオプションが有効になっている場合、POST中にサーバーが応答しなくなる、またはPOSTを完了するのに予期しない時間がかかる問題に対処しました。</p><p>インテルXeonスケーラブルプロセッサの混合SKUがインストールされている場合にサーバーが起動できる問題に対処しました。これらの構成では、サーバーはエラーメッセージを表示し、起動を停止する必要があります。</p><p>システムROMが最新バージョンのHPE電源装置との電源装置不一致状態をログに記録していた問題に対処しました。この問題が発生したとき、動的消費電力上限と高効率電源装置モードも無効になっていました。この問題を適切に軽減するには、iLOファームウェアバージョン2.50以降も必要です。</p><p><strong>既知の問題点:</strong></p>なし
        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.

HPE recommends that customers using Intel Optane Persistent Memory update to this version of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system may experience an Unexpected Shutdown or a Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only impacts systems configured with Intel Optane DC Persistent Memory in one of these modes. HPE recommends updating to this version of the System ROM for any customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed Mode. This issue is not unique to HPE servers. </p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-24511. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-464. The Intel microcode patches included in this release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567). These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and CVE-2020-24486. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00463.  These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which address various functional issues documented in the Intel Technical Specification update. These issues are documented as the EIBRS Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not unique to HPE servers.</p><p>Addressed an issue where the server may become unresponsive during POST or take an unexpected long time to complete POST when the RBSU Extended Memory Test option was enabled. </p><p>Addressed an issue where the server was allowed to boot when mixed SKUs of Intel Xeon Scalable Processors are installed.  The server should display an error message and halt boot in these configurations.</p><p>Addressed an issue where the System ROM was logging a mismatched power supply condition with the latest version of the HPE Power Supplies. When this issue occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or later is also needed.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.

HPE recommends that customers using Intel Optane Persistent Memory update to this version of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system may experience an Unexpected Shutdown or a Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only impacts systems configured with Intel Optane DC Persistent Memory in one of these modes. HPE recommends updating to this version of the System ROM for any customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed Mode. This issue is not unique to HPE servers. </p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-24511. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-464. The Intel microcode patches included in this release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567). These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and CVE-2020-24486. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00463.  These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which address various functional issues documented in the Intel Technical Specification update. These issues are documented as the EIBRS Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not unique to HPE servers.</p><p>Addressed an issue where the server may become unresponsive during POST or take an unexpected long time to complete POST when the RBSU Extended Memory Test option was enabled. </p><p>Addressed an issue where the server was allowed to boot when mixed SKUs of Intel Xeon Scalable Processors are installed.  The server should display an error message and halt boot in these configurations.</p><p>Addressed an issue where the System ROM was logging a mismatched power supply condition with the latest version of the HPE Power Supplies. When this issue occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or later is also needed.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>システムの稼働時間を改善するために、高速フォールトトレラントメモリモード（ADDDC）のサポートをアップデートしました。</p><p>ダブリン/ロンドン（UTC 1）を追加するために、BIOS/プラットフォーム構成（RBSU）タイムゾーンのサポートが追加されました。このサポートには、最新バージョンのiLOファームウェアバージョン2.40以降も必要です。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p>

<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is Disabled by default. This issue was introduced in the v2.40 revision of the System ROM.</p>

<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p>

<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p>

<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is Disabled by default. This issue was introduced in the v2.40 revision of the System ROM.</p>

<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p>

<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>

<p>なし</p>

<p><strong>ファームウェアの依存関係:</strong></p>

<p> なし</p>

<p><strong>修正された問題：</strong></p>

<p>システムROMのこのリビジョンには、インテル製マイクロコードの最新リビジョンが含まれています。これは、命令の短いループを伴う重いストレス下での潜在的なマシンチェック例外の修正を提供します。これにより、インテグレーテッドマネジメントログ（IML）に記録されているように、MSCOD = 0080およびMCACOD = 0400hのバンク3でマシンチェック例外が発生する可能性があります。このリリースに含まれているインテル製マイクロコードパッチは、バージョン0x04003005（CPUID 50656）および0x05003005（CPUID 50657）です。この問題は、第2世代のインテルXeonスケーラブルパフォーマンスプロセッサーにのみ影響します。この問題は、HPEサーバーに固有のものではありません。</p>

<p>システムROMのこのリビジョンには、インテル製マイクロコードの最新リビジョンが含まれています。これは、PCIeで高レベルの割り込みトラフィックが発生した場合の潜在的なマシンチェック例外の修正を提供します。これにより、インテグレーテッドマネジメントログログ（IML）に記録されているように、MSCOD = 000Chのバンク9、10、または11でマシンチェック例外が発生する可能性があります。このリリースに含まれているインテル製マイクロコードパッチは、バージョン0x02006A09（CPUID 50654）、0x04003005（CPUID 50656）、0x05003005（CPUID 50657）です。この変更の一環として、アドバンストパフォーマンスオプションに新しいBIOS/プラットフォーム構成（RBSU）オプションが追加され、お客様がこの緩和策を無効にできるようになりました。この問題は、HPEサーバーに固有のものではありません。</p>

<p>サーバーの起動時にリアルタイムクロックが破損する可能性がある非常にまれな問題に対処しました。これは通常、RTCの年フィールドの予期しない変更として現れましたが、日付と時刻の他の部分に影響を与える可能性があります。この問題は、HPEサーバーに固有のものではありません。</p>

<p>BIOS/プラットフォーム構成（RBSU）で有効に構成されている場合に拡張メモリテストが実行されない問題に対処しました。このオプションはデフォルトでは無効になっていることに注意してください。この問題はシステムROMバージョン2.40で最初に発生したものです。</p>

<p>サーバーがAHCI SATAドライブで構成されている場合に、サーバーシステムのファンが予想よりも高速で動作する可能性がある問題に対処しました。</p>

<p>不良LRDIMMメモリデバイスをマップから除外することはできたが、インテグレーテッドマネジメントログ（IML）に適切に報告できなかった問題に対処しました。この問題は、LRDIMMで構成されたシステムにのみ影響しました。</p>

<p><strong>既知の問題点:</strong></p>

<p>なし
        </p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p>

<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is Disabled by default. This issue was introduced in the v2.40 revision of the System ROM.</p>

<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p>

<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p>

<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is Disabled by default. This issue was introduced in the v2.40 revision of the System ROM.</p>

<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p>

<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.40_10-26-2020" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[メモリオプションに新しいBIOS/プラットフォーム構成(RBSU)オプションを追加しました。Low Watermark設定を選択すると、メモリコントローラーはDDR4RowHammer攻撃の影響を受けにくくなります。Low Watermark設定を有効にすると、メモリパフォーマンスへの影響が見られることが予想されます。システムのデフォルトの動作は変更されていません。追加のRowHammer保護を提供したいお客様は、この設定を有効にする必要があります。<p>BIOS/プラットフォーム構成(RBSU)のサポートが追加され、セキュアブート署名リストを署名付きバイナリファイルとしてインポートおよびエクスポートできるようになりました。これは、UEFIフォーラム(https://uefi.org/revocationlistfile)に記載されているように、Microsoftの失効リストバイナリファイルをSecure Boot DBXにインポートするのに便利です。<p>サードパーティのオプションカードで利用可能な64ビットのメモリマップドI/Oの量を増やすために、システムROMをアップデートしました。<p>最新のHPEオプションデバイスでOne Buttonセキュア消去機能のシステムROM対応をアップデートしました。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにHPE RESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2020.2ガイダンスに沿ったアップデートが含まれています。</p>

<p><strong>ファームウェアの依存関係:</strong></p>

<p>なし</p>

<p><strong>修正された問題：</strong></p>

<p>このバージョンのシステムROMには、チャネルごとに2つのDIMMで構成されたシステムのメモリの安定性を向上させるのに役立つインテルメモリリファレンスコードのアップデートが含まれています。インテルIPU.2.2020リリースに含まれる改善点の詳細については、インテルのサイティングドキュメントを参照してください。この問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMのリビジョンには、CVE-2020-8696 として文書化されているセキュリティ上の脆弱性に対する緩和策を提供するインテル製マイクロコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-0381 に文書化されています。今回のリリースに含まれるインテル製マイクロコードパッチは、バージョン0x02006A08(CPUID 50654)、0x04003003(CPUID 50656)、0x05003003(CPUID 50567)。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMのリビジョンには、CVE-2020-0587、CVE-2020-0588、CVE-2020-0590、CVE-2020-0591、CVE-2020-0592、および CVE-2020-0593 として文書化されたBIOSアドバイザリおよびセキュリティ上の脆弱性の緩和を提供するインテルリファレンスコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-00358 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMのリビジョンには、BIOSプラットフォームのコード勧告および CVE-2020-8738、CVE-2020-8739、CVE-2020-8740、および CVE-2020-8764 として文書化されているセキュリティ上の脆弱性に対する緩和策を提供するインテルリファレンスコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-00390 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>このリビジョンのシステムROMには、メモリトレーニング中にシステムが再起動ループでスタックする可能性がある問題に対処したインテルリファレンスコードの最新リビジョンが含まれています。この問題はシステムROMバージョン2.30で最初に発生したものです。この問題はHPEサーバーに固有のものではありませんでした。</p>

<p>ACPI SLITテーブルのメモリローカリティが正しく作成されない問題に対処しました。まれに、ACPI SLITの値が正しくないと、システムのパフォーマンスに予期せぬ影響が出ることがあります。この問題はv2.10のシステムROMで発生し、以前のバージョンのシステムROMには影響しませんでした。</p>

<p>VMwareでNVMe Hot-plugとHot-addが正常に機能しない問題に対処しました。この問題は、他のオペレーティングシステムでのNVMe Hot-plugやHot-addには影響しませんでした。</p>

<p>Advanced Double DRAM Device Correction (ADDC)のスペアリング動作中に未修正のメモリ障害が発生した場合、システムがインテグレーテッドマネジメントログ(IML)でメモリ交換イベントを適切にコールアウトしない問題に対処しました。この修正は、これらのイベントの不正なロギングに影響を与えるだけで、修正されていないメモリ障害を引き起こしたり、A3DC機能の動作に変更を加えたりするという点で、システムの正常な動作に影響を与えることはありません。この問題は、高速フォールトトレラントメモリモード(ADDC)用に構成されたシステムにのみ影響します。</p>

<p>拡張メモリテストのBIOS/プラットフォーム構成(RBSU)オプションが、システム再起動後に自動的に無効になる可能性がある問題に対処しました。この問題はv2.30のシステムROMで発生し、以前のバージョンのシステムROMには影響しませんでした。</p>

<p><strong>既知の問題点:</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.36_07-16-2020" revision="" type_of_change="0"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.</p>

<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.</p>

<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.</p>

<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.</p>

<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.</p>

<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.34_04-08-2020" revision="" type_of_change="0"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[プラットフォームの最新の熱サポートにアップデートされました。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the serial port would not function properly when the iLO CLI serial interface was also enabled on the platform. This could lead to the serial BAUD rate not being configured properly and the serial output from the host would be corrupted or no output would be seen.<p>Addressed an issue where UEFI Serial Debug output could inadvertently be seen over BIOS Serial Console. This issue would be seen periodically on server reboots. This issue was introduced with System ROM v2.30 and did not impact servers using previous versions of the System ROM.<p>Addressed an extremely rare issue where the system could become unresponsive in POST when configured in Legacy Boot Mode when a USB Mouse is attached. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where boot devices could disappear from the Boot Options menu in the BIOS/Platform Configuration (RBSU) when pressing the F10 or F12 key to save boot order changes.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the serial port would not function properly when the iLO CLI serial interface was also enabled on the platform. This could lead to the serial BAUD rate not being configured properly and the serial output from the host would be corrupted or no output would be seen.<p>Addressed an issue where UEFI Serial Debug output could inadvertently be seen over BIOS Serial Console. This issue would be seen periodically on server reboots. This issue was introduced with System ROM v2.30 and did not impact servers using previous versions of the System ROM.<p>Addressed an extremely rare issue where the system could become unresponsive in POST when configured in Legacy Boot Mode when a USB Mouse is attached. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where boot devices could disappear from the Boot Options menu in the BIOS/Platform Configuration (RBSU) when pressing the F10 or F12 key to save boot order changes.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>なし<P><B>ファームウェアの依存関係:</B></P> なし<P><B>修正された問題点：</B></P>プラットフォーム上でiLO CLIシリアルインターフェイスも有効になっている場合、シリアルポートが正しく機能しない問題に対処しました。これにより、シリアルボーレートが正しく構成されず、ホストからのシリアル出力が破損したり、出力が表示されなくなったりする可能性がありました。<p>UEFIシリアルデバッグ出力がBIOSシリアルコンソールで誤って表示される問題に対処しました。この問題は、サーバーの再起動時に定期的に見られます。この問題はv2.30のシステムROMで発生し、以前のバージョンのシステムROMには影響しませんでした。<p>USBマウスが接続されている場合、レガシーブートモードで構成されているとシステムがPOSTで応答しなくなるという非常にまれな問題に対処しました。この問題は、UEFIブートモードで構成されているシステムには影響しません。<p>起動順序の変更を保存するためにF10キーまたはF12キーを押すと、BIOS/プラットフォーム構成（RBSU）の[起動オプション]メニューから起動デバイスが消える可能性がある問題に対処しました。<P><B>既知の問題点:</B></P> なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the serial port would not function properly when the iLO CLI serial interface was also enabled on the platform. This could lead to the serial BAUD rate not being configured properly and the serial output from the host would be corrupted or no output would be seen.<p>Addressed an issue where UEFI Serial Debug output could inadvertently be seen over BIOS Serial Console. This issue would be seen periodically on server reboots. This issue was introduced with System ROM v2.30 and did not impact servers using previous versions of the System ROM.<p>Addressed an extremely rare issue where the system could become unresponsive in POST when configured in Legacy Boot Mode when a USB Mouse is attached. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where boot devices could disappear from the Boot Options menu in the BIOS/Platform Configuration (RBSU) when pressing the F10 or F12 key to save boot order changes.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the serial port would not function properly when the iLO CLI serial interface was also enabled on the platform. This could lead to the serial BAUD rate not being configured properly and the serial output from the host would be corrupted or no output would be seen.<p>Addressed an issue where UEFI Serial Debug output could inadvertently be seen over BIOS Serial Console. This issue would be seen periodically on server reboots. This issue was introduced with System ROM v2.30 and did not impact servers using previous versions of the System ROM.<p>Addressed an extremely rare issue where the system could become unresponsive in POST when configured in Legacy Boot Mode when a USB Mouse is attached. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where boot devices could disappear from the Boot Options menu in the BIOS/Platform Configuration (RBSU) when pressing the F10 or F12 key to save boot order changes.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.32_03-09-2020" revision="B" type_of_change="2"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support. Please see advisory: &nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097734en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097734en_us</a></p>

<p>Ver. 2.32_03-09-2020(B)&nbsp; contains updates to the firmware packaging and is functionally equivalent to ver. 2.32_03-09-2020.&nbsp; It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 2.32_03-09-2020.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 0/1/5/10 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as single RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support. Please see advisory: &nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097734en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097734en_us</a></p>

<p>Ver. 2.32_03-09-2020(B)&nbsp; contains updates to the firmware packaging and is functionally equivalent to ver. 2.32_03-09-2020.&nbsp; It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 2.32_03-09-2020.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 0/1/5/10 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as single RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>このバージョンのシステムROMには、HPE Smartアレイs100i UEFIドライバーの最新サポートが含まれています。このシステムROMは、HPE Smartアレイs100iサポートを有効にしているお客様にとって重要です。カスタマアドバイザリ（<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097734en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097734en_us</a>）を参照してください。</p>

<p>バージョン2.32_03-09-2020 (B)にはコンポーネントパッケージのアップデートが含まれており、機能的にはバージョン2.32_03-09-2020と同等です。  ファームウェアをバージョン2.32_03-09-2020にアップグレードするために以前のリビジョンのコンポーネントが使われた場合は、リビジョン(B)にアップグレードする必要はありません。</p>

<p><strong>ファームウェアの依存関係:</strong></p>

<p>なし</p>

<p><strong>修正された問題点：</strong></p>

<p>RAID 0/1/5/10フォールトトレラントモードで構成されたRAIDボリュームの初期構成または操作中に、HPE Smartアレイs100iソフトウェアRAIDで潜在的なデータの不整合が発生する可能性がある問題に対処しました。この問題は、シングルRAID 0や1のような他のRAID構成で構成されたシステムには影響しません。この問題は、Smartアレイs100iサポートを有効にしていないシステムには影響しません。</p>

<p><strong>既知の問題点:</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support. Please see advisory: &nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097734en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097734en_us</a></p>

<p>Ver. 2.32_03-09-2020(B)&nbsp; contains updates to the firmware packaging and is functionally equivalent to ver. 2.32_03-09-2020.&nbsp; It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 2.32_03-09-2020.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 0/1/5/10 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as single RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support. Please see advisory: &nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097734en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097734en_us</a></p>

<p>Ver. 2.32_03-09-2020(B)&nbsp; contains updates to the firmware packaging and is functionally equivalent to ver. 2.32_03-09-2020.&nbsp; It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 2.32_03-09-2020.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 0/1/5/10 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as single RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.32_03-09-2020" revision="" type_of_change="2"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 5/50/50/60 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 5/50/50/60 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>このバージョンのシステムROMには、HPE Smartアレイs100i UEFIドライバーの最新サポートが含まれています。このシステムROMは、HPE Smartアレイs100iサポートを有効にしているお客様にとって重要です。<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点：</B></P>RAID 5/50/50/60フォールトトレラントモードで構成されたRAIDボリュームの初期構成または操作中に、HPE Smartアレイs100iソフトウェアRAIDで潜在的なデータの不整合が発生する可能性がある問題に対処しました。この問題は、RAID 0または1などの他のRAID構成で構成されたシステムには影響しません。この問題は、Smartアレイs100iサポートを有効にしていないシステムには影響しません。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 5/50/50/60 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 5/50/50/60 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.30_02-11-2020" revision="" type_of_change="2"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to the Intel Persistent DC Performance Settings called Balanced Performance Mode. This option may improve performance of systems configured with Intel DC Persistent Memory with certain workloads.<p>Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to the Intel Persistent DC Performance Settings called Balanced Performance Mode. This option may improve performance of systems configured with Intel DC Persistent Memory with certain workloads.<p>Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[バランスパフォーマンスモードと呼ばれるIntel Persistent DCパフォーマンス設定に新しいBIOS/プラットフォーム構成（RBSU）オプションを追加しました。このオプションは、特定のワークロードでIntel DC Persistent Memoryで構成されたシステムのパフォーマンスを改善する場合があります。<p>プラットフォームの最新の熱サポートにアップデートされました。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to the Intel Persistent DC Performance Settings called Balanced Performance Mode. This option may improve performance of systems configured with Intel DC Persistent Memory with certain workloads.<p>Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to the Intel Persistent DC Performance Settings called Balanced Performance Mode. This option may improve performance of systems configured with Intel DC Persistent Memory with certain workloads.<p>Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode which addresses a Mesh to Memory Machine Check Exception failure when Fast Fault Tolerant Memory Mode (ADDDC) is enabled. In most cases, this issue results in the log of an Integrated Management Log (IML) Bank 8 or Bank 9 Machine Check Exception with a status of 0xB2000000:00200400 but can also result in a system reset with an Unexpected Shutdown logged. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-0548 and CVE-2020-0549, also known as CacheOut. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00329.  These issues are not unique to HPE servers.<p>Addressed an issue where the server may become unresponsive during POST with a Red Screen Exception (RSOD) when the server was reset (restarted) at the same time that an iLO firmware reset was initiated.  Note that updating iLO firmware results in the reset of iLO firmware.<p>Addressed an issue where the System Utilities System Information data could not be successfully exported to an FTP (network) location. Previously the System Utilities would report the file was saved successfully but no actual information was saved on the network share.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode which addresses a Mesh to Memory Machine Check Exception failure when Fast Fault Tolerant Memory Mode (ADDDC) is enabled. In most cases, this issue results in the log of an Integrated Management Log (IML) Bank 8 or Bank 9 Machine Check Exception with a status of 0xB2000000:00200400 but can also result in a system reset with an Unexpected Shutdown logged. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-0548 and CVE-2020-0549, also known as CacheOut. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00329.  These issues are not unique to HPE servers.<p>Addressed an issue where the server may become unresponsive during POST with a Red Screen Exception (RSOD) when the server was reset (restarted) at the same time that an iLO firmware reset was initiated.  Note that updating iLO firmware results in the reset of iLO firmware.<p>Addressed an issue where the System Utilities System Information data could not be successfully exported to an FTP (network) location. Previously the System Utilities would report the file was saved successfully but no actual information was saved on the network share.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点：</B></P>システムROMのこのリビジョンには、高速フォールトトレラントメモリモード（ADDDC）が有効になっている場合のメッシュツーメモリマシンチェック例外エラーに対処するIntelマイクロコードの最新リビジョンが含まれています。ほとんどの場合、この問題により、ステータスが0xB2000000：00200400のインテグレーテッドマネージメントログ（IML）バンク8またはバンク9 マシンチェック例外のログが生成されますが、予期しないシャットダウンがログに記録されてシステムがリセットされることもあります。この問題は、HPEサーバーに固有のものではありません。<p>システムROMのこのリビジョンには、CVE-2020-0548およびCVE-2020-0549（CacheOutとも呼ばれる）として文書化されたセキュリティ脆弱性の緩和策を提供するIntelマイクロコードの最新リビジョンが含まれています。これらのセキュリティ脆弱性は、Intel Security Advisory INTEL-SA-00329に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。<p>iLOファームウェアのリセットが開始されたのと同時にサーバーがリセット（再起動）されたときに、サーバーがPOST中にレッドスクリーン例外（RSOD）で応答しなくなる問題に対処しました。iLOファームウェアをアップデートすると、iLOファームウェアがリセットされることに注意してください。<p>システムユーティリティのシステム情報データをFTP（ネットワーク）ロケーションに正常にエクスポートできなかった問題に対処しました。以前は、システムユーティリティはファイルが正常に保存されたと報告していましたが、実際の情報はネットワーク共有に保存されていませんでした。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode which addresses a Mesh to Memory Machine Check Exception failure when Fast Fault Tolerant Memory Mode (ADDDC) is enabled. In most cases, this issue results in the log of an Integrated Management Log (IML) Bank 8 or Bank 9 Machine Check Exception with a status of 0xB2000000:00200400 but can also result in a system reset with an Unexpected Shutdown logged. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-0548 and CVE-2020-0549, also known as CacheOut. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00329.  These issues are not unique to HPE servers.<p>Addressed an issue where the server may become unresponsive during POST with a Red Screen Exception (RSOD) when the server was reset (restarted) at the same time that an iLO firmware reset was initiated.  Note that updating iLO firmware results in the reset of iLO firmware.<p>Addressed an issue where the System Utilities System Information data could not be successfully exported to an FTP (network) location. Previously the System Utilities would report the file was saved successfully but no actual information was saved on the network share.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode which addresses a Mesh to Memory Machine Check Exception failure when Fast Fault Tolerant Memory Mode (ADDDC) is enabled. In most cases, this issue results in the log of an Integrated Management Log (IML) Bank 8 or Bank 9 Machine Check Exception with a status of 0xB2000000:00200400 but can also result in a system reset with an Unexpected Shutdown logged. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-0548 and CVE-2020-0549, also known as CacheOut. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00329.  These issues are not unique to HPE servers.<p>Addressed an issue where the server may become unresponsive during POST with a Red Screen Exception (RSOD) when the server was reset (restarted) at the same time that an iLO firmware reset was initiated.  Note that updating iLO firmware results in the reset of iLO firmware.<p>Addressed an issue where the System Utilities System Information data could not be successfully exported to an FTP (network) location. Previously the System Utilities would report the file was saved successfully but no actual information was saved on the network share.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.22_11-13-2019" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[プラットフォームの最新の熱サポートにアップデートされました。<p>システムユーティリティのための言語翻訳（英語以外のモード）をアップデートしました。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM replaces the previously published v2.20 System ROM.  The v2.20 System ROM introduced an issue where a small subset LRDIMMs could experience an uncorrectable memory error. This issue had been previously fixed in the v2.14 ROM of the System ROM.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities.  The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode.  This problem could occur with other optional PCIe graphics adapters.  This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions.  This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map.  The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out.  This change only impacts the IML logging of the error and does not impact the operation of the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM replaces the previously published v2.20 System ROM.  The v2.20 System ROM introduced an issue where a small subset LRDIMMs could experience an uncorrectable memory error. This issue had been previously fixed in the v2.14 ROM of the System ROM.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities.  The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode.  This problem could occur with other optional PCIe graphics adapters.  This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions.  This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map.  The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out.  This change only impacts the IML logging of the error and does not impact the operation of the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>このバージョンのシステムROMは、以前に公開されたv2.20システムROMを置き換えます。v2.20システムROMでは、小さなサブセットのLRDIMMで修正不能なメモリエラーが発生する可能性があるという問題が発生しました。この問題は、システムROMのv2.14 ROMで以前に修正されていました。<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点:</B></P>このシステムROMのリビジョンは、CVE-2019-151に対する緩和策を提供するインテルTrusted eXecution Technology（TXT）の最新サポートが含まれています。この緩和策は、TXTが有効になっているシステムでのみ必要です。この問題は、HPEサーバーに固有のものではありません。<p>このシステムROMのリビジョンは、複数のセキュリティ脆弱性に対する緩和策を提供するインテルリファレンスコードサポートの最新版が含まれています。次の脆弱性は、このシステム ROM リリースで対応済です。CVE-2019-11137、CVE-2019-152、およびCVE-2019-11136。これらの問題は、HPEサーバーに固有のものではありません。<p>システムROMのこのリビジョンには、CVE-2017-5715、CVE-2019-11135、およびCVE-2019-11139の緩和策を提供するインテルマイクロコードの最新リビジョンが含まれています。これらの問題は、HPEサーバーに固有のものではありません。<p>システムROMのこのリビジョンには、インテルマイクロコードの最新リビジョンが含まれています。これは、複雑なマイクロアーキテクチャー条件下で、X87またはAVXまたは整数除算命令を実行すると予測できないシステム動作が発生するインテルSightingを緩和します。この問題は、HPEサーバーに固有のものではありません。<p>iLOとサーバーの両方が同時にリセットされると、POST中にシステムが応答しなくなる問題に対処しました。<p>Matrox GPUが存在し、サーバーがレガシーブートモードで起動している場合、起動中にサーバーでレッドスクリーン（RSOD）が発生する可能性がある問題に対処しました。この問題は、他のオプションのPCIeグラフィックスアダプターで発生する可能性があります。この問題は断続的なものではなく、以前のシステムROMリビジョンの影響を受けるオプションのPCIeグラフィックアダプターを使用するすべてのブートで発生します。この問題は、UEFIブートモードで構成されたサーバーまたは組み込みグラフィックスコントローラーを使用している場合には見られません。<p>DIMMがシステムメモリマップにまだ存在している場合、インテグレーテッドマネージメントログ（IML）でメモリトレーニングの失敗後にDIMMがマップアウトされたことをシステムが誤って報告する可能性がある問題に対処しました。IMLはメモリトレーニングの失敗を正しく示すようになりましたが、DIMMがマップされたことを示しません。この変更は、エラーのIMLロギングにのみ影響し、システムの動作には影響しません。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM replaces the previously published v2.20 System ROM.  The v2.20 System ROM introduced an issue where a small subset LRDIMMs could experience an uncorrectable memory error. This issue had been previously fixed in the v2.14 ROM of the System ROM.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities.  The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode.  This problem could occur with other optional PCIe graphics adapters.  This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions.  This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map.  The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out.  This change only impacts the IML logging of the error and does not impact the operation of the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM replaces the previously published v2.20 System ROM.  The v2.20 System ROM introduced an issue where a small subset LRDIMMs could experience an uncorrectable memory error. This issue had been previously fixed in the v2.14 ROM of the System ROM.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities.  The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode.  This problem could occur with other optional PCIe graphics adapters.  This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions.  This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map.  The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out.  This change only impacts the IML logging of the error and does not impact the operation of the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.20_10-31-2019" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[プラットフォームの最新の熱サポートにアップデートされました。<p>システムユーティリティのための言語翻訳（英語以外のモード）をアップデートしました。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities. The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.</p>

<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode. This problem could occur with other optional PCIe graphics adapters. This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions. This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.</p>

<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map. The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out. This change only impacts the IML logging of the error and does not impact the operation of the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities. The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.</p>

<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode. This problem could occur with other optional PCIe graphics adapters. This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions. This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.</p>

<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map. The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out. This change only impacts the IML logging of the error and does not impact the operation of the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>なし</p>

<p><strong>ファームウェアの依存関係：</strong></p>

<p>なし</p>

<p><strong>修正された問題点：</strong></p>

<p>このシステムROMのリビジョンは、CVE-2019-151に対する緩和策を提供するインテル トラステッド エグゼキューション テクノロジー（TXT）の最新サポートが含まれています。この軽減は、TXTが有効になっているシステムでのみ必要です。この問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMのリビジョンは、複数のセキュリティ脆弱性に対する緩和策を提供するインテルリファレンスコードサポートの最新版が含まれています。次の脆弱性は、このシステム ROM リリースで対応済です。CVE-2019-11137、CVE-2019-152、およびCVE-2019-11136。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>システムROMのこのリビジョンには、CVE-2017-5715、CVE-2019-11135、およびCVE-2019-11139の緩和策を提供するインテルマイクロコードの最新リビジョンが含まれています。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>システムROMのこのリビジョンには、インテルマイクロコードの最新リビジョンが含まれています。これは、複雑なマイクロアーキテクチャー条件下で、X87またはAVXまたは整数除算命令を実行すると予測できないシステム動作が発生するインテルSightingを緩和します。この問題は、HPEサーバーに固有のものではありません。</p>

<p>iLOとサーバーの両方が同時にリセットされると、POST中にシステムが応答しなくなる問題に対処しました。</p>

<p>Matrox GPUが存在し、サーバーがレガシーブートモードで起動している場合、起動中にサーバーでレッドスクリーン（RSOD）が発生する可能性がある問題に対処しました。この問題は、他のオプションのPCIeグラフィックスアダプターで発生する可能性があります。この問題は断続的なものではなく、以前のシステムROMリビジョンの影響を受けるオプションのPCIeグラフィックアダプターを使用するすべてのブートで発生します。この問題は、UEFIブートモードで構成されたサーバーまたは組み込みグラフィックスコントローラーを使用している場合には見られません。</p>

<p>DIMMがシステムメモリマップにまだ存在している場合、インテグレーテッドマネージメントログ（IML）でメモリトレーニングの失敗後にDIMMがマップアウトされたことをシステムが誤って報告する可能性がある問題に対処しました。IMLはメモリトレーニングの失敗を正しく示すようになりましたが、DIMMがマップされたことを示しません。この変更は、エラーのIMLロギングにのみ影響し、システムの動作には影響しません。</p>

<p><strong>既知の問題点：</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities. The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.</p>

<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode. This problem could occur with other optional PCIe graphics adapters. This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions. This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.</p>

<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map. The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out. This change only impacts the IML logging of the error and does not impact the operation of the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities. The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.</p>

<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode. This problem could occur with other optional PCIe graphics adapters. This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions. This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.</p>

<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map. The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out. This change only impacts the IML logging of the error and does not impact the operation of the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.16_09-12-2019" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This version of the System ROM includes the latest revision of the Intel microcode which addresses an issue where the system may experience an unexpected machine check exception. This issue would be logged to the Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04  with status  0xBE000000'00800400 or  0xFE000000'00800400 Machine Check Exception. This issue is not unique to HPE servers.<p>This version of the System ROM includes the latest version of the Intel microcode which addresses an issue where under complex microarchitectural conditions involving branch instructions that span multiple 64 byte boundaries, unpredictable system behavior may occur. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This version of the System ROM includes the latest revision of the Intel microcode which addresses an issue where the system may experience an unexpected machine check exception. This issue would be logged to the Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04  with status  0xBE000000'00800400 or  0xFE000000'00800400 Machine Check Exception. This issue is not unique to HPE servers.<p>This version of the System ROM includes the latest version of the Intel microcode which addresses an issue where under complex microarchitectural conditions involving branch instructions that span multiple 64 byte boundaries, unpredictable system behavior may occur. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点:</B></P>システムROMのこのバージョンには、システムで予期しないマシンチェック例外が発生する可能性のある問題に対処するためのインテル マイクロコードの最新リビジョンが含まれています。この問題は、ステータス0xBE000000'00800400または0xFE000000'00800400マシンチェック例外を持つバンク0x03またはバンク0x04としてインテグレーテッドマネジメントログ（IML）に記録されます。この問題は、HPEサーバーに固有のものではありません。<p>このバージョンのシステムROMには、複数の64バイト境界にまたがる分岐命令を含む複雑なマイクロアーキテクチャ条件で、予測できないシステム動作が発生する可能性がある問題に対処するインテル マイクロコードの最新バージョンが含まれています。この問題は、HPEサーバーに固有のものではありません。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This version of the System ROM includes the latest revision of the Intel microcode which addresses an issue where the system may experience an unexpected machine check exception. This issue would be logged to the Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04  with status  0xBE000000'00800400 or  0xFE000000'00800400 Machine Check Exception. This issue is not unique to HPE servers.<p>This version of the System ROM includes the latest version of the Intel microcode which addresses an issue where under complex microarchitectural conditions involving branch instructions that span multiple 64 byte boundaries, unpredictable system behavior may occur. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This version of the System ROM includes the latest revision of the Intel microcode which addresses an issue where the system may experience an unexpected machine check exception. This issue would be logged to the Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04  with status  0xBE000000'00800400 or  0xFE000000'00800400 Machine Check Exception. This issue is not unique to HPE servers.<p>This version of the System ROM includes the latest version of the Intel microcode which addresses an issue where under complex microarchitectural conditions involving branch instructions that span multiple 64 byte boundaries, unpredictable system behavior may occur. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.14_09-05-2019" revision="" type_of_change="0"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,  P03055-091 and P11057-0A1) may experience an uncorrectable memory error when operating with a Second Generation Intel Xeon Scalable Processor. This issue can be seen when processor c-states are enabled on the platform. This issue does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that customers experiencing an uncorrectable memory error in one of these configurations update to this version of the System ROM before replacing any memory. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,  P03055-091 and P11057-0A1) may experience an uncorrectable memory error when operating with a Second Generation Intel Xeon Scalable Processor. This issue can be seen when processor c-states are enabled on the platform. This issue does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that customers experiencing an uncorrectable memory error in one of these configurations update to this version of the System ROM before replacing any memory. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点:</B></P>特定の2933Mhz LRDIMM（HPE製品番号P03054-091、P03055-091、およびP11057-0A1）が、第2世代インテルXeonスケーラブルプロセッサーで動作しているときに修正不可能なメモリエラーが発生する問題に対処しました。この問題は、プラットフォームでプロセッサーのc-stateが有効になっている場合に見られます。この問題は、2666Mhz LRDIMMまたはその他の速度のRDIMMには影響しません。HPEではメモリを交換する前に、これらの構成のいずれかで修正不能なメモリエラーが発生した場合、システムROMのこのバージョンにアップデートすることをお勧めします。この問題は、HPEサーバーに固有のものではありません。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,  P03055-091 and P11057-0A1) may experience an uncorrectable memory error when operating with a Second Generation Intel Xeon Scalable Processor. This issue can be seen when processor c-states are enabled on the platform. This issue does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that customers experiencing an uncorrectable memory error in one of these configurations update to this version of the System ROM before replacing any memory. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,  P03055-091 and P11057-0A1) may experience an uncorrectable memory error when operating with a Second Generation Intel Xeon Scalable Processor. This issue can be seen when processor c-states are enabled on the platform. This issue does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that customers experiencing an uncorrectable memory error in one of these configurations update to this version of the System ROM before replacing any memory. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.10_05-21-2019" revision="" type_of_change="0"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority Based Frequency to support enabling Intel Speed Select - Base Frequency support on select 2nd Generation Xeon Scalable Family Processors that are optimized for NFV workloads. This option, which is disabled by default, is located in the Processor Options menu and visible only when NFV optimized SKUs are installed (denoted by the N in the SKU model). On supported Operating Systems, Intel Speed Select - Based Frequency functionality allows high priority cores to operate at a higher frequency than the nominal base frequency while lower priority cores will run at a slower frequency.<p>Added a new BIOS/Platform Configuration (RBSU)  I/O Direct Cache (IODC) menu to the Power and Performance Menu. This option allows for tuning the policy for which I/O transactions interact with the processor cache. The caching policy may have a slight impact on cross socket latency. Workloads where this option would need to be modified from its default value for optimum performance are extremely rare.<p>Added support for HPE Fast Fault Tolerant  Memory (ADDDC) to operate when a single memory rank is only available on a given memory channel. Previous versions of the System ROM required two or more memory ranks to be available on each memory channel. After updating to this version of the System ROM the server will automatically configure the system for HPE Fast Fault Tolerant Memory Mode if the memory configuration supports this option.<p>Updated the UEFI OpenSSL support to version 1.0.2r to address security vulnerability CVE-2019-1559.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority Based Frequency to support enabling Intel Speed Select - Base Frequency support on select 2nd Generation Xeon Scalable Family Processors that are optimized for NFV workloads. This option, which is disabled by default, is located in the Processor Options menu and visible only when NFV optimized SKUs are installed (denoted by the N in the SKU model). On supported Operating Systems, Intel Speed Select - Based Frequency functionality allows high priority cores to operate at a higher frequency than the nominal base frequency while lower priority cores will run at a slower frequency.<p>Added a new BIOS/Platform Configuration (RBSU)  I/O Direct Cache (IODC) menu to the Power and Performance Menu. This option allows for tuning the policy for which I/O transactions interact with the processor cache. The caching policy may have a slight impact on cross socket latency. Workloads where this option would need to be modified from its default value for optimum performance are extremely rare.<p>Added support for HPE Fast Fault Tolerant  Memory (ADDDC) to operate when a single memory rank is only available on a given memory channel. Previous versions of the System ROM required two or more memory ranks to be available on each memory channel. After updating to this version of the System ROM the server will automatically configure the system for HPE Fast Fault Tolerant Memory Mode if the memory configuration supports this option.<p>Updated the UEFI OpenSSL support to version 1.0.2r to address security vulnerability CVE-2019-1559.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[NFVワークロード用に最適化された特定の第2世代Xeonスケーラブルファミリプロセッサでのインテルスピードセレクト - ベース周波数サポートの有効化をサポートするために、インテルPriority Based FrequencyをBIOS/プラットフォーム構成（RBSU）オプションに新しく追加しました。このオプションはデフォルトでは無効になっており、[プロセッサーオプション]メニューにあり、NFV最適化SKUがインストールされている場合にのみ表示されます（SKUモデルではNと表示されます）。サポートされているオペレーティングシステムでは、インテルSpeed Select-Based Frequency機能により、優先度の高いコアは公称基本周波数よりも高い周波数で動作し、優先度の低いコアは低速の周波数で動作します。<p>BIOS/プラットフォーム構成（RBSU）にI/Oダイレクトキャッシュ（IODC）メニューを電源とパフォーマンスメニューが新しく追加されました。このオプションにより、I/Oトランザクションがプロセッサーキャッシュと対話するためのポリシーを調整できます。キャッシングポリシーは、ソケット間の待ち時間にわずかな影響を与える可能性があります。最適なパフォーマンスを得るためにこのオプションをデフォルト値から変更する必要がある作業負荷は非常にまれです。<p>単一のメモリランクが特定のメモリチャネルでしか使用できない場合に動作するためのHPE高速耐故障性メモリ(ADDDC)のサポートを追加しました。以前のバージョンのシステムROMでは、各メモリチャネルで2つ以上のメモリランクを使用できる必要がありました。このバージョンのシステムROMにアップデートした後、メモリ構成がこのオプションをサポートしている場合、サーバーは自動的にシステムをHPE高速フォールトトレラントメモリモードに構成します。<p>セキュリティの脆弱性CVE-2019-1559に対処するために、UEFI OpenSSLサポートをバージョン1.0.2rに更新しました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority Based Frequency to support enabling Intel Speed Select - Base Frequency support on select 2nd Generation Xeon Scalable Family Processors that are optimized for NFV workloads. This option, which is disabled by default, is located in the Processor Options menu and visible only when NFV optimized SKUs are installed (denoted by the N in the SKU model). On supported Operating Systems, Intel Speed Select - Based Frequency functionality allows high priority cores to operate at a higher frequency than the nominal base frequency while lower priority cores will run at a slower frequency.<p>Added a new BIOS/Platform Configuration (RBSU)  I/O Direct Cache (IODC) menu to the Power and Performance Menu. This option allows for tuning the policy for which I/O transactions interact with the processor cache. The caching policy may have a slight impact on cross socket latency. Workloads where this option would need to be modified from its default value for optimum performance are extremely rare.<p>Added support for HPE Fast Fault Tolerant  Memory (ADDDC) to operate when a single memory rank is only available on a given memory channel. Previous versions of the System ROM required two or more memory ranks to be available on each memory channel. After updating to this version of the System ROM the server will automatically configure the system for HPE Fast Fault Tolerant Memory Mode if the memory configuration supports this option.<p>Updated the UEFI OpenSSL support to version 1.0.2r to address security vulnerability CVE-2019-1559.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority Based Frequency to support enabling Intel Speed Select - Base Frequency support on select 2nd Generation Xeon Scalable Family Processors that are optimized for NFV workloads. This option, which is disabled by default, is located in the Processor Options menu and visible only when NFV optimized SKUs are installed (denoted by the N in the SKU model). On supported Operating Systems, Intel Speed Select - Based Frequency functionality allows high priority cores to operate at a higher frequency than the nominal base frequency while lower priority cores will run at a slower frequency.<p>Added a new BIOS/Platform Configuration (RBSU)  I/O Direct Cache (IODC) menu to the Power and Performance Menu. This option allows for tuning the policy for which I/O transactions interact with the processor cache. The caching policy may have a slight impact on cross socket latency. Workloads where this option would need to be modified from its default value for optimum performance are extremely rare.<p>Added support for HPE Fast Fault Tolerant  Memory (ADDDC) to operate when a single memory rank is only available on a given memory channel. Previous versions of the System ROM required two or more memory ranks to be available on each memory channel. After updating to this version of the System ROM the server will automatically configure the system for HPE Fast Fault Tolerant Memory Mode if the memory configuration supports this option.<p>Updated the UEFI OpenSSL support to version 1.0.2r to address security vulnerability CVE-2019-1559.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Server Backup and Restore functionality may not work properly if initiated through the HPE RESTful API returning a message "An internal error occurred during RIS operation".<p>Addressed an issue where configuring memory to run at 2x refresh rate would still actually operate memory at 1x refresh rate. This issue was introduced with the v2.00 System ROM and did not impact earlier versions of the System ROM. This issue is not unique to HPE servers.<p>Addressed an issue where the NVMe PCIe Resource Padding option in BIOS/Platform Configuration (RBSU)  would not properly allocated sufficient resources to support a NVMe hot add event. In certain configurations, an insufficient amount of resources would have been reserved and a reboot would have been required to detect the presence of the newly added drive.<p>Addressed an issue where the system would not boot to a USB drive when a non-bootable (non-formatted) drive was also present in the system. This issue only impacts systems configured in Legacy Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Server Backup and Restore functionality may not work properly if initiated through the HPE RESTful API returning a message "An internal error occurred during RIS operation".<p>Addressed an issue where configuring memory to run at 2x refresh rate would still actually operate memory at 1x refresh rate. This issue was introduced with the v2.00 System ROM and did not impact earlier versions of the System ROM. This issue is not unique to HPE servers.<p>Addressed an issue where the NVMe PCIe Resource Padding option in BIOS/Platform Configuration (RBSU)  would not properly allocated sufficient resources to support a NVMe hot add event. In certain configurations, an insufficient amount of resources would have been reserved and a reboot would have been required to detect the presence of the newly added drive.<p>Addressed an issue where the system would not boot to a USB drive when a non-bootable (non-formatted) drive was also present in the system. This issue only impacts systems configured in Legacy Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点:</B></P>HPE RESTful APIを介して "RIS操作中に内部エラーが発生しました"というメッセージが返されると、サーバーのバックアップと復元機能が正しく動作しない場合があるという問題が解決されました。<p>2倍のリフレッシュレートで動作するようにメモリを設定しても、実際には1倍のリフレッシュレートでメモリが動作するという問題に対処しました。この問題はv2.00のシステムROMで発生し、以前のバージョンのシステムROMには影響しませんでした。この問題は、HPEサーバーに固有のものではありません。<p>BIOS/プラットフォーム構成（RBSU）のNVMe PCIeリソースパディングオプションが、NVMeホットアドイベントをサポートするのに十分なリソースを適切に割り当てられない問題に対処しました。特定の構成では十分な量のリソースが予約されておらず、新しく追加されたドライブの存在を検出するために再起動が必要でした。<p>起動不可能な（フォーマットされていない）ドライブもシステムに存在する場合に、システムがUSBドライブから起動しないという問題に対処しました。この問題は、レガシーブートモードで設定されたシステムにのみ影響します。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Server Backup and Restore functionality may not work properly if initiated through the HPE RESTful API returning a message "An internal error occurred during RIS operation".<p>Addressed an issue where configuring memory to run at 2x refresh rate would still actually operate memory at 1x refresh rate. This issue was introduced with the v2.00 System ROM and did not impact earlier versions of the System ROM. This issue is not unique to HPE servers.<p>Addressed an issue where the NVMe PCIe Resource Padding option in BIOS/Platform Configuration (RBSU)  would not properly allocated sufficient resources to support a NVMe hot add event. In certain configurations, an insufficient amount of resources would have been reserved and a reboot would have been required to detect the presence of the newly added drive.<p>Addressed an issue where the system would not boot to a USB drive when a non-bootable (non-formatted) drive was also present in the system. This issue only impacts systems configured in Legacy Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Server Backup and Restore functionality may not work properly if initiated through the HPE RESTful API returning a message "An internal error occurred during RIS operation".<p>Addressed an issue where configuring memory to run at 2x refresh rate would still actually operate memory at 1x refresh rate. This issue was introduced with the v2.00 System ROM and did not impact earlier versions of the System ROM. This issue is not unique to HPE servers.<p>Addressed an issue where the NVMe PCIe Resource Padding option in BIOS/Platform Configuration (RBSU)  would not properly allocated sufficient resources to support a NVMe hot add event. In certain configurations, an insufficient amount of resources would have been reserved and a reboot would have been required to detect the presence of the newly added drive.<p>Addressed an issue where the system would not boot to a USB drive when a non-bootable (non-formatted) drive was also present in the system. This issue only impacts systems configured in Legacy Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.04_04-18-2019" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience a higher rate of Uncorrectable Memory errors or boot time Memory training issues with Intel Xeon Scalable Performance Bronze and Silver processors. This issue was first introduced with System ROM version 2.00. HPE recommends that any customer experiencing a memory issue immediately update to this version of the system ROM before replacing any components. This issue is not unique to HPE servers.<p>Addressed an issue where the HPE RESTful Firmware update manager may fail to update a component or experience a boot time Red Screen (RSOD) after the HPE 369i Integrated NIC firmware was updated to the latest revision.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience a higher rate of Uncorrectable Memory errors or boot time Memory training issues with Intel Xeon Scalable Performance Bronze and Silver processors. This issue was first introduced with System ROM version 2.00. HPE recommends that any customer experiencing a memory issue immediately update to this version of the system ROM before replacing any components. This issue is not unique to HPE servers.<p>Addressed an issue where the HPE RESTful Firmware update manager may fail to update a component or experience a boot time Red Screen (RSOD) after the HPE 369i Integrated NIC firmware was updated to the latest revision.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点:</B></P>インテルプロセッサーのマイクロコードを最新バージョンにアップデート。<p>インテル XeonスケーラブルパフォーマンスBronzeおよびSilverプロセッサーで、システムで訂正不可能なメモリエラーまたは起動時のメモリトレーニングの問題が発生する可能性がある問題に対処しました。この問題はシステムROMバージョン2.00で最初に発生したものです。メモリに関する問題が発生しているお客様は、コンポーネントを交換する前に、このバージョンのシステムROMに直ちにアップデートすることを推奨します。この問題は、HPEサーバーに固有のものではありません。<p>HPE 369i内蔵NICファームウェアが最新のリビジョンにアップデートされた後、HPE RESTfulファームウェアアップデートマネージャーがコンポーネントのアップデートに失敗したり、起動時にレッドスクリーン(RSOD)が発生したりすることがある問題に対処しました。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience a higher rate of Uncorrectable Memory errors or boot time Memory training issues with Intel Xeon Scalable Performance Bronze and Silver processors. This issue was first introduced with System ROM version 2.00. HPE recommends that any customer experiencing a memory issue immediately update to this version of the system ROM before replacing any components. This issue is not unique to HPE servers.<p>Addressed an issue where the HPE RESTful Firmware update manager may fail to update a component or experience a boot time Red Screen (RSOD) after the HPE 369i Integrated NIC firmware was updated to the latest revision.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience a higher rate of Uncorrectable Memory errors or boot time Memory training issues with Intel Xeon Scalable Performance Bronze and Silver processors. This issue was first introduced with System ROM version 2.00. HPE recommends that any customer experiencing a memory issue immediately update to this version of the system ROM before replacing any components. This issue is not unique to HPE servers.<p>Addressed an issue where the HPE RESTful Firmware update manager may fail to update a component or experience a boot time Red Screen (RSOD) after the HPE 369i Integrated NIC firmware was updated to the latest revision.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.02_03-19-2019" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p>This system ROM contains the latest Intel microcode that addresses an issue where the system may experience an Uncorrected Machine Check Exception in Bank 0 with Status containing 000F0150. This update may not address all Bank 0 machine check events with a Status containing 000F0150 but should be used before any other further service actions for issues resulting in this Integrated Management Log (IML) entry. This issue is not unique to HPE servers. This issue was incorrectly documented as being addressed in the v2.00 System ROMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p>This system ROM contains the latest Intel microcode that addresses an issue where the system may experience an Uncorrected Machine Check Exception in Bank 0 with Status containing 000F0150. This update may not address all Bank 0 machine check events with a Status containing 000F0150 but should be used before any other further service actions for issues resulting in this Integrated Management Log (IML) entry. This issue is not unique to HPE servers. This issue was incorrectly documented as being addressed in the v2.00 System ROMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>このリビジョンのシステムROMには、複雑なマイクロアーキテクチャー条件下で、インテルTSX（Transactional Synchronizations Extensions）を使用するソフトウェアに予期しないシステム動作が発生する可能性があるという現在インテルが観察している問題を軽減するインテルマイクロコードの最新リビジョンが含まれています。インテルは総合テスト条件でのみこの動作を観察し、この動作を示している市販のソフトウェアを確認していません。この問題は、HPEサーバーに固有のものではありません。</p>

<p><strong>ファームウェアの依存関係:</strong></p>

<p>なし</p>

<p><strong>修正された問題点：</strong></p>

<p>このリビジョンのシステムROMには、複雑なマイクロアーキテクチャー条件下で、インテルTSX（Transactional Synchronizations Extensions）を使用するソフトウェアに予期しないシステム動作が発生する可能性があるという現在インテルが観察している問題を軽減するインテルマイクロコードの最新リビジョンが含まれています。インテルは総合テスト条件でのみこの動作を観察し、この動作を示している市販のソフトウェアを確認していません。この問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMには、システムが000F0150を含むステータスでバンク0に未訂正のマシンチェック例外が発生することがあるという問題に対応する最新のインテルマイクロコードが含まれています。この更新は、000F0150を含むステータスを持つバンク0のすべてのマシンチェックイベントに対処できるわけではありませんが、このインテグレーテッドマネジメントログ（IML）エントリーを発生させる問題に対する他のすべてのサービスアクションを行う前に、この更新を使用する必要があります。この問題は、HPEサーバーに固有のものではありません。この問題は、v2.00のシステムROMで対処されていると誤って記載されていました。</p>

<p><strong>既知の問題点：</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p>This system ROM contains the latest Intel microcode that addresses an issue where the system may experience an Uncorrected Machine Check Exception in Bank 0 with Status containing 000F0150. This update may not address all Bank 0 machine check events with a Status containing 000F0150 but should be used before any other further service actions for issues resulting in this Integrated Management Log (IML) entry. This issue is not unique to HPE servers. This issue was incorrectly documented as being addressed in the v2.00 System ROMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p>This system ROM contains the latest Intel microcode that addresses an issue where the system may experience an Uncorrected Machine Check Exception in Bank 0 with Status containing 000F0150. This update may not address all Bank 0 machine check events with a Status containing 000F0150 but should be used before any other further service actions for issues resulting in this Integrated Management Log (IML) entry. This issue is not unique to HPE servers. This issue was incorrectly documented as being addressed in the v2.00 System ROMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.50_12-29-2018" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM contains enhancements to the HPE memory support to improve memory resiliency. Please consult the following Customer Advisory for additional details: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Improved the memory resiliency of the server with enhanced support for HPE Fast Fault Tolerant Memory (ADDDC) capabilities.  This System ROM will now configure the Advanced Memory Protection mode of the server to HPE Fast Fault Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and Custom if the feature is supported by the server's DIMM configuration.  Note that if the Advanced Memory Protection mode had previously been configured for Mirroring or Online Spare, the setting will NOT be automatically changed to HPE Fast Fault Tolerant Memory (ADDDC) mode.  Also, if the DIMM configuration does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the Advanced Memory Protection Mode will remain Advanced ECC Mode.  Note that if the current BIOS configuration settings are queried via Redfish or the RESTful API, the setting for the Advanced Memory Protection Mode will indicate this change.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM contains enhancements to the HPE memory support to improve memory resiliency. Please consult the following Customer Advisory for additional details: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Improved the memory resiliency of the server with enhanced support for HPE Fast Fault Tolerant Memory (ADDDC) capabilities.  This System ROM will now configure the Advanced Memory Protection mode of the server to HPE Fast Fault Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and Custom if the feature is supported by the server's DIMM configuration.  Note that if the Advanced Memory Protection mode had previously been configured for Mirroring or Online Spare, the setting will NOT be automatically changed to HPE Fast Fault Tolerant Memory (ADDDC) mode.  Also, if the DIMM configuration does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the Advanced Memory Protection Mode will remain Advanced ECC Mode.  Note that if the current BIOS configuration settings are queried via Redfish or the RESTful API, the setting for the Advanced Memory Protection Mode will indicate this change.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM contains enhancements to the HPE memory support to improve memory resiliency. Please consult the following Customer Advisory for additional details: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Improved the memory resiliency of the server with enhanced support for HPE Fast Fault Tolerant Memory (ADDDC) capabilities.  This System ROM will now configure the Advanced Memory Protection mode of the server to HPE Fast Fault Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and Custom if the feature is supported by the server's DIMM configuration.  Note that if the Advanced Memory Protection mode had previously been configured for Mirroring or Online Spare, the setting will NOT be automatically changed to HPE Fast Fault Tolerant Memory (ADDDC) mode.  Also, if the DIMM configuration does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the Advanced Memory Protection Mode will remain Advanced ECC Mode.  Note that if the current BIOS configuration settings are queried via Redfish or the RESTful API, the setting for the Advanced Memory Protection Mode will indicate this change.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM contains enhancements to the HPE memory support to improve memory resiliency. Please consult the following Customer Advisory for additional details: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Improved the memory resiliency of the server with enhanced support for HPE Fast Fault Tolerant Memory (ADDDC) capabilities.  This System ROM will now configure the Advanced Memory Protection mode of the server to HPE Fast Fault Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and Custom if the feature is supported by the server's DIMM configuration.  Note that if the Advanced Memory Protection mode had previously been configured for Mirroring or Online Spare, the setting will NOT be automatically changed to HPE Fast Fault Tolerant Memory (ADDDC) mode.  Also, if the DIMM configuration does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the Advanced Memory Protection Mode will remain Advanced ECC Mode.  Note that if the current BIOS configuration settings are queried via Redfish or the RESTful API, the setting for the Advanced Memory Protection Mode will indicate this change.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM contains enhancements to the HPE memory support to improve memory resiliency. Please consult the following Customer Advisory for additional details: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Improved the memory resiliency of the server with enhanced support for HPE Fast Fault Tolerant Memory (ADDDC) capabilities.  This System ROM will now configure the Advanced Memory Protection mode of the server to HPE Fast Fault Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and Custom if the feature is supported by the server's DIMM configuration.  Note that if the Advanced Memory Protection mode had previously been configured for Mirroring or Online Spare, the setting will NOT be automatically changed to HPE Fast Fault Tolerant Memory (ADDDC) mode.  Also, if the DIMM configuration does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the Advanced Memory Protection Mode will remain Advanced ECC Mode.  Note that if the current BIOS configuration settings are queried via Redfish or the RESTful API, the setting for the Advanced Memory Protection Mode will indicate this change.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
    </revision>
    <revision>
      <version value="1.46_10-02-2018" revision="" type_of_change="0"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for flashing the firmware of the optional HPE Trusted Platform Module (TPM).  This is the minimum revision of the System ROM that should be used if updating the firmware on the optional HPE TPM module.<p>Added a new PCIe Peer-to-Peer Serialization option to the Advanced Performance Options menu in the BIOS/Platform Configuration (RBSU). This option can be used to improve peer-to-peer performance between two PCIe devices installed on the same processor. This option may improve performance in certain GP-GPU configurations.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for flashing the firmware of the optional HPE Trusted Platform Module (TPM).  This is the minimum revision of the System ROM that should be used if updating the firmware on the optional HPE TPM module.<p>Added a new PCIe Peer-to-Peer Serialization option to the Advanced Performance Options menu in the BIOS/Platform Configuration (RBSU). This option can be used to improve peer-to-peer performance between two PCIe devices installed on the same processor. This option may improve performance in certain GP-GPU configurations.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[オプションのHPE Trusted Platform Module（TPM）のファームウェアをフラッシュする機能のサポートを追加しました。これは、オプションのHPE TPMモジュールのファームウェアを更新する場合に使用するシステムROMの最小リビジョンです。<p>BIOS/プラットフォーム構成（RBSU）のアドバンストパフォーマンスオプションメニューに新しいPCIeピアツーピア直列化オプションを追加しました。このオプションは、同一のプロセッサーにインストールされている2つのPCIeデバイス間でのピアツーピアのパフォーマンスを向上できます。このオプションにより、特定のGP GPU構成でのパフォーマンスが向上する場合があります。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for flashing the firmware of the optional HPE Trusted Platform Module (TPM).  This is the minimum revision of the System ROM that should be used if updating the firmware on the optional HPE TPM module.<p>Added a new PCIe Peer-to-Peer Serialization option to the Advanced Performance Options menu in the BIOS/Platform Configuration (RBSU). This option can be used to improve peer-to-peer performance between two PCIe devices installed on the same processor. This option may improve performance in certain GP-GPU configurations.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for flashing the firmware of the optional HPE Trusted Platform Module (TPM).  This is the minimum revision of the System ROM that should be used if updating the firmware on the optional HPE TPM module.<p>Added a new PCIe Peer-to-Peer Serialization option to the Advanced Performance Options menu in the BIOS/Platform Configuration (RBSU). This option can be used to improve peer-to-peer performance between two PCIe devices installed on the same processor. This option may improve performance in certain GP-GPU configurations.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where early server video output, on a locally attached monitor, may not show correctly when the monitor is attached to the server through a KVM. This issue does not impact systems that are not using a KVM or video output through the iLO Remote Console application.<p>Addressed an issue where firmware flashing through the RESTful API could periodically fail and the task being marked with an exception in the iLO firmware page.  This issue could impact flashing firmware such as the HPE Innovation Engine, Intel SPS Firmware or the optional HPE Trusted Platform Module (TPM).<p>Addressed an issue where a PCIe card would not properly train to its maximum speed when the PCIe Bifurcation option was enabled. This issue does not impact PCIe cards that do not require bifurcation.<p>Addressed an extremely rare issue where a system configured with an optional SATA DVD drive and an HPE SmartArray controller may become unresponsive during boot, usually with a Red Screen (RSOD), when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<p>Addressed an issue where an optional PCIe card's legacy option ROM may not properly display its legacy setup menu prompt during boot when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where early server video output, on a locally attached monitor, may not show correctly when the monitor is attached to the server through a KVM. This issue does not impact systems that are not using a KVM or video output through the iLO Remote Console application.<p>Addressed an issue where firmware flashing through the RESTful API could periodically fail and the task being marked with an exception in the iLO firmware page.  This issue could impact flashing firmware such as the HPE Innovation Engine, Intel SPS Firmware or the optional HPE Trusted Platform Module (TPM).<p>Addressed an issue where a PCIe card would not properly train to its maximum speed when the PCIe Bifurcation option was enabled. This issue does not impact PCIe cards that do not require bifurcation.<p>Addressed an extremely rare issue where a system configured with an optional SATA DVD drive and an HPE SmartArray controller may become unresponsive during boot, usually with a Red Screen (RSOD), when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<p>Addressed an issue where an optional PCIe card's legacy option ROM may not properly display its legacy setup menu prompt during boot when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点：</B></P>KVMを通じてモニターがサーバーに接続している場合に、ローカルに接続したモニターへの初期サーバービデオ出力が、正しく表示されないことがあるという問題に対処しました。この問題は、KVMを使用していないシステムや、iLOリモートコンソールアプリケーションを通じたビデオ出力には影響しません。<p>RESTful APIを通じたファームウェアのフラッシュが定期的に失敗し、iLOファームウェアページに例外とマークされるという問題に対処しました。この問題は、HPE Innovation Engine、インテルSPSファームウェア、またはオプションのHPE Trusted Platform Module（TPM）などのファームウェアのフラッシュに影響する可能性があります。<p>PCIe Bifurcationオプションを有効にしたときに、PCIeカードがその最大速度まで適切に上昇しなくなるという問題に対処しました。この問題は、分岐（Bifurcation）を必要としないPCIeカードには影響しません。<p>オプションのSATA DVDドライブとHPE Smartアレイコントローラーで構成されているシステムが、レガシーブートモードで、ブート中に応答しなくなり、通常は赤色の画面（RSOD）が表示されるという非常にまれな問題に対処しました。この問題は、UEFIブートモードのシステムには影響しません。<p>オプションのPCIeカードのレガシーオプションROMが、レガシーブートモードで起動中にレガシーのセットアップメニュープロンプトを適切に表示しないことがあるという問題に対処しました。この問題は、UEFIブートモードのシステムには影響しません。<P><B>既知の問題点：</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where early server video output, on a locally attached monitor, may not show correctly when the monitor is attached to the server through a KVM. This issue does not impact systems that are not using a KVM or video output through the iLO Remote Console application.<p>Addressed an issue where firmware flashing through the RESTful API could periodically fail and the task being marked with an exception in the iLO firmware page.  This issue could impact flashing firmware such as the HPE Innovation Engine, Intel SPS Firmware or the optional HPE Trusted Platform Module (TPM).<p>Addressed an issue where a PCIe card would not properly train to its maximum speed when the PCIe Bifurcation option was enabled. This issue does not impact PCIe cards that do not require bifurcation.<p>Addressed an extremely rare issue where a system configured with an optional SATA DVD drive and an HPE SmartArray controller may become unresponsive during boot, usually with a Red Screen (RSOD), when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<p>Addressed an issue where an optional PCIe card's legacy option ROM may not properly display its legacy setup menu prompt during boot when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where early server video output, on a locally attached monitor, may not show correctly when the monitor is attached to the server through a KVM. This issue does not impact systems that are not using a KVM or video output through the iLO Remote Console application.<p>Addressed an issue where firmware flashing through the RESTful API could periodically fail and the task being marked with an exception in the iLO firmware page.  This issue could impact flashing firmware such as the HPE Innovation Engine, Intel SPS Firmware or the optional HPE Trusted Platform Module (TPM).<p>Addressed an issue where a PCIe card would not properly train to its maximum speed when the PCIe Bifurcation option was enabled. This issue does not impact PCIe cards that do not require bifurcation.<p>Addressed an extremely rare issue where a system configured with an optional SATA DVD drive and an HPE SmartArray controller may become unresponsive during boot, usually with a Red Screen (RSOD), when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<p>Addressed an issue where an optional PCIe card's legacy option ROM may not properly display its legacy setup menu prompt during boot when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.42_06-20-2018" revision="" type_of_change="2"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This firmware version includes additional fixes (since version 1.40) for an issue where systems may experience a 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems may log an erroneous Bank 4 Machine Check to the iLO Integrated Management Log (IML) on a system reset event. In most cases, this error can safely be ignored. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This firmware version includes additional fixes (since version 1.40) for an issue where systems may experience a 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems may log an erroneous Bank 4 Machine Check to the iLO Integrated Management Log (IML) on a system reset event. In most cases, this error can safely be ignored. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>

<p>このシステムROMのリビジョンには、オペレーティングシステムのアップデートの組み合わせによって、Speculative Store Bypass（Variant 4とも呼ばれます）のセキュリティ脆弱性の軽減を提供する、Intelマイクロコードの最新のリビジョンが含まれています。この問題には中レベルのCVEが割り当てられており、IDはCVE-2018-3639です。投機的実行機能を利用するマイクロプロセッサーを搭載し、先のすべてのメモリ書き込みのアドレスが判明する前にメモリ読み取りを投機的に実行するシステムでは、サイドチャネル解析を通じて、ローカルユーザーのアクセス権を持つ攻撃者に情報が不正に開示される可能性があります。こうしたセキュリティ上の脆弱性は、HPEサーバーに固有のものではなく、影響を受けたプロセッサーを利用するすべてのシステムに影響します。</p>

<p>このシステムROMのリビジョンには、Rogue Register Read(Variant 3aとも呼ばれます)のセキュリティ脆弱性の軽減を提供する、Intelマイクロコードの最新のリビジョンが含まれています。この問題には中レベルのCVEが割り当てられており、IDはCVE-2018-3640です。投機的実行機能を利用するマイクロプロセッサーを搭載し、システムレジスタの投機的読み取りを行うシステムでは、サイドチャネル解析を通じて、ローカルユーザーのアクセス権を持つ攻撃者にシステムパラメーターが不正に開示される可能性があります。こうしたセキュリティ上の脆弱性は、HPEサーバーに固有のものではなく、影響を受けたプロセッサーを利用するすべてのシステムに影響します。</p>

<p><strong>ファームウェアの依存関係:</strong></p>

<p> なし</p>

<p><strong>修正された問題点:</strong></p>

<p>このシステムROMのリビジョンには、オペレーティングシステムのアップデートの組み合わせによって、Speculative Store Bypass（Variant 4とも呼ばれます）のセキュリティ脆弱性の軽減を提供する、Intelマイクロコードの最新のリビジョンが含まれています。この問題には中レベルのCVEが割り当てられており、IDはCVE-2018-3639です。投機的実行機能を利用するマイクロプロセッサーを搭載し、先のすべてのメモリ書き込みのアドレスが判明する前にメモリ読み取りを投機的に実行するシステムでは、サイドチャネル解析を通じて、ローカルユーザーのアクセス権を持つ攻撃者に情報が不正に開示される可能性があります。こうしたセキュリティ上の脆弱性は、HPEサーバーに固有のものではなく、影響を受けたプロセッサーを利用するすべてのシステムに影響します。</p>

<p>このシステムROMのリビジョンには、Rogue Register Read(Variant 3aとも呼ばれます)のセキュリティ脆弱性の軽減を提供する、Intelマイクロコードの最新のリビジョンが含まれています。この問題には中レベルのCVEが割り当てられており、IDはCVE-2018-3640です。投機的実行機能を利用するマイクロプロセッサーを搭載し、システムレジスタの投機的読み取りを行うシステムでは、サイドチャネル解析を通じて、ローカルユーザーのアクセス権を持つ攻撃者にシステムパラメーターが不正に開示される可能性があります。こうしたセキュリティ上の脆弱性は、HPEサーバーに固有のものではなく、影響を受けたプロセッサーを利用するすべてのシステムに影響します。</p>

<p>このファームウェアバージョンには、システムで、iLO Integrated Management Log（IML）に記録されている「a 389-Unexpected Shutdown and Restart」が発生することがある問題についての追加の修正（バージョン1.40以降）が含まれています。この問題は、HPEサーバーに固有のものではありません。</p>

<p>システムでシステムリセットイベントの発生時に誤ったBank 4マシンチェックがiLO Integrated Management Log（IML）に記録されることがある問題に対処しました。ほとんどの場合、このエラーは無視してもかまいません。この問題は、HPEサーバーに固有のものではありません。</p>

<p><strong>既知の問題点:</strong></p>

<p> なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This firmware version includes additional fixes (since version 1.40) for an issue where systems may experience a 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems may log an erroneous Bank 4 Machine Check to the iLO Integrated Management Log (IML) on a system reset event. In most cases, this error can safely be ignored. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This firmware version includes additional fixes (since version 1.40) for an issue where systems may experience a 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems may log an erroneous Bank 4 Machine Check to the iLO Integrated Management Log (IML) on a system reset event. In most cases, this error can safely be ignored. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
  </revision_history>
  <sw_keys>
    <sw_keys_and>
      <sw_key guid="" name="U41">
        <sw_key_expectedpath>firmware:system</sw_key_expectedpath>
      </sw_key>
    </sw_keys_and>
  </sw_keys>
<payload>
  <DeviceClass>aa148d2e-6e09-453e-bc6f-63baa5f5ccc4</DeviceClass>
  <Devices>
    <Device>
      <DeviceName>System BIOS - U41</DeviceName>
      <FirmwareImages>
        <DelayAfterInstallSec>0</DelayAfterInstallSec>
        <DirectFlashOk>True</DirectFlashOk>
        <FileName>U41_3.60_08_06_2025.signed.flash</FileName>
        <InstallDurationSec>300</InstallDurationSec>
        <Order>1</Order>
        <PLDMImage>False</PLDMImage>
        <ResetRequired>True</ResetRequired>
        <ServerPowerOff>False</ServerPowerOff>
        <SysPowerON>False</SysPowerON>
        <Type>Firmware</Type>
        <UefiFlashable>True</UefiFlashable>
      </FirmwareImages>
      <Target>00000000-0000-0000-0000-000000000216</Target>
      <Version>v3.60 (08/06/2025)</Version>
    </Device>
  </Devices>
  <PackageFormat>FWPKG-v2</PackageFormat>
  <Type>Firmware</Type>
  <UpdatableBy>Bmc</UpdatableBy>
</payload>
  <prerequisites>
    <supported_operating_systems>
      <supported_operating_system platform="oi" major="0" minor="0" sr="OEM" name="Cross Operating System"/>
      <supported_operating_system platform="vmware_esx_server" major="7" minor="0" sr="OEM" name="VMware ESXi 7.0"/>
      <supported_operating_system platform="vmware_esx_server" major="6" minor="5" sr="OEM" name="VMware vSphere 6.5"/>
      <supported_operating_system platform="vmware_esx_server" major="8" minor="0" sr="OEM" name="VMware ESXi 8.0"/>
      <supported_operating_system platform="vmware_esx_server" major="6" minor="7" sr="OEM" name="VMware vSphere 6.7"/>
      <supported_operating_system platform="vmware_esx_server" major="6" minor="0" sr="OEM" name="VMware vSphere 6.0"/>
    </supported_operating_systems>
    <supported_devices/>
    <required_diskspace size_kb="11000"/>
  </prerequisites>
  <installation>
    <install>
      <install_caps silent="yes" needuseracct="no"/>
      <command>cpqsetup.exe</command>
      <command_params></command_params>
      <reboot_required value="yes"/>
      <reboot_details value="Required">
        <reboot_details_xlate lang="en">Reboot is required after installation for updates to take effect and hardware stability to be maintained.</reboot_details_xlate>
        <reboot_details_xlate lang="cn">安装之后必须重启才能使更新生效并保持硬件稳定性。</reboot_details_xlate>
        <reboot_details_xlate lang="ja">アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要です。</reboot_details_xlate>
        <reboot_details_xlate lang="ko">업데이트가 적용되고 하드웨어 안정성이 유지되려면 설치 후 재부팅해야 합니다.</reboot_details_xlate>
        <reboot_details_xlate lang="tw">安裝後必須重新啟動，更新才會生效，並維持硬體穩定。</reboot_details_xlate>
      </reboot_details>
      <per_device_install_time_seconds>300</per_device_install_time_seconds>
    </install>
    <uninstall>
      <uninstall_caps silent="no"/>
      <command></command>
      <command_params></command_params>
      <reboot_required value="no"/>
    </uninstall>
  </installation>
</cpq_package>
