<?xml version="1.0" encoding="UTF-8"?>
<cpq_package version="2.0.1.0">
  <filename>cp058637.exe</filename>
  <divisions>
    <division key="6">
      <division_xlate lang="en">Server</division_xlate>
      <division_xlate lang="cn">服务器</division_xlate>
      <division_xlate lang="ja">サーバ</division_xlate>
      <division_xlate lang="ko">서버</division_xlate>
      <division_xlate lang="tw">伺服器</division_xlate>
    </division>
  </divisions>
  <operating_systems>
    <operating_system key="">
      <operating_system_xlate>Microsoft Windows Server 2012 R2</operating_system_xlate>
    </operating_system>
    <operating_system key="">
      <operating_system_xlate>Microsoft Windows Server 2016</operating_system_xlate>
    </operating_system>
    <operating_system key="">
      <operating_system_xlate>Microsoft Windows Server 2019</operating_system_xlate>
    </operating_system>
    <operating_system key="">
      <operating_system_xlate>Microsoft Windows Server 2022</operating_system_xlate>
    </operating_system>
  </operating_systems>
  <products>
    <product rom="U32"/>
  </products>
  <category key="1200212">
    <category_xlate lang="en">BIOS - System ROM</category_xlate>
  </category>
  <id product="36877a0ed97d40a29cfe6cb469a6e72f" version="ffe537b0580a430db5b33d129baea665"/>
  <name>
    <name_xlate lang="en">Online ROM Flash Component for Windows x64 - HPE ProLiant DL360 Gen10 (U32) Servers</name_xlate>
    <name_xlate lang="cn">Online ROM Flash Component for Windows x64 - HPE ProLiant DL360 Gen10 (U32) Servers</name_xlate>
    <name_xlate lang="ja">オンラインROMフラッシュコンポーネントfor Windows x64 - HPE ProLiant DL360 Gen10 (U32)サーバー</name_xlate>
    <name_xlate lang="ko">Online ROM Flash Component for Windows x64 - HPE ProLiant DL360 Gen10 (U32) Servers</name_xlate>
    <name_xlate lang="tw">Online ROM Flash Component for Windows x64 - HPE ProLiant DL360 Gen10 (U32) Servers</name_xlate>
  </name>
  <alt_name>
    <alt_name_xlate lang="en">HPE ProLiant DL360 Gen10 (U32) Servers</alt_name_xlate>
    <alt_name_xlate lang="cn">HPE ProLiant DL360 Gen10 (U32) Servers</alt_name_xlate>
    <alt_name_xlate lang="ja">HPE ProLiant DL360 Gen10 (U32)サーバー</alt_name_xlate>
    <alt_name_xlate lang="ko">HPE ProLiant DL360 Gen10 (U32) Servers</alt_name_xlate>
    <alt_name_xlate lang="tw">HPE ProLiant DL360 Gen10 (U32) Servers</alt_name_xlate>
  </alt_name>
  <version value="3.00_10-19-2023" revision="" type_of_change="1"/>
  <manufacturer_name>
    <manufacturer_name_xlate lang="en">Hewlett Packard Enterprise</manufacturer_name_xlate>
    <manufacturer_name_xlate lang="cn">惠普企业</manufacturer_name_xlate>
    <manufacturer_name_xlate lang="ja">Hewlett Packard Enterprise</manufacturer_name_xlate>
    <manufacturer_name_xlate lang="ko">Hewlett Packard Enterprise</manufacturer_name_xlate>
    <manufacturer_name_xlate lang="tw">Hewlett Packard Enterprise</manufacturer_name_xlate>
  </manufacturer_name>
  <languages langlist="en">
    <languages_xlate lang="en">English (US)</languages_xlate>
    <languages_xlate lang="ja">英語（US）</languages_xlate>
    <languages_xlate lang="ko">영어(미국)</languages_xlate>
    <languages_xlate lang="cn">英语（美国）</languages_xlate>
    <languages_xlate lang="tw">美式英文</languages_xlate>
  </languages>
  <release_date year="2023" month="10" day="27" hour="4" minute="22" second="48"/>
  <description>
    <description_xlate lang="en">
<![CDATA[This component provides updated system firmware that can be installed directly on supported Operating Systems. Additionally, when used in conjunction with Smart Update Manager (SUM), this Component allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.]]>
</description_xlate>
    <description_xlate lang="cn">
<![CDATA[This component provides updated system firmware that can be installed directly on supported Operating Systems. Additionally, when used in conjunction with Smart Update Manager (SUM), this Component allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.]]>
</description_xlate>
    <description_xlate lang="ja">
<![CDATA[このコンポーネントは、サポートされるオペレーティングシステム上で直接インストール可能なアップデートされたシステムファームウェアを提供します。 さらに、HP Smart Update Manager (SUM) と共に使用する場合、このコンポーネントは、ユーザーが中央からリモートサーバーのファームウェアをアップデートすることを可能にします。 このリモート展開機能により、ファームウェアをアップデートするために使用者がサーバーへ物理的に移動する必要がなくなります。]]>
</description_xlate>
    <description_xlate lang="ko">
<![CDATA[This component provides updated system firmware that can be installed directly on supported Operating Systems. Additionally, when used in conjunction with Smart Update Manager (SUM), this Component allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.]]>
</description_xlate>
    <description_xlate lang="tw">
<![CDATA[This component provides updated system firmware that can be installed directly on supported Operating Systems. Additionally, when used in conjunction with Smart Update Manager (SUM), this Component allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.]]>
</description_xlate>
  </description>
  <prerequisite_notes>
    <prerequisite_notes_xlate lang="en">
      <prerequisite_notes_xlate_part>
<![CDATA[<p>The &quot;iLO 5 Channel Interface Driver&rdquo; (CHIF) for Windows which is available from Service Pack for ProLiant (SPP).</p>
]]>
</prerequisite_notes_xlate_part>
    </prerequisite_notes_xlate>
    <prerequisite_notes_xlate lang="cn">
      <prerequisite_notes_xlate_part>
<![CDATA[<p>The &quot;iLO 5 Channel Interface Driver&rdquo; (CHIF) for Windows which is available from Service Pack for ProLiant (SPP).</p>
]]>
</prerequisite_notes_xlate_part>
    </prerequisite_notes_xlate>
    <prerequisite_notes_xlate lang="ja">
      <prerequisite_notes_xlate_part>
<![CDATA[<p>Service Pack for ProLiant(SPP)から入手可能なWindows用のiLO 5 Channel Interface Driver(CHIF)。</p>
]]>
</prerequisite_notes_xlate_part>
    </prerequisite_notes_xlate>
    <prerequisite_notes_xlate lang="ko">
      <prerequisite_notes_xlate_part>
<![CDATA[<p>The &quot;iLO 5 Channel Interface Driver&rdquo; (CHIF) for Windows which is available from Service Pack for ProLiant (SPP).</p>
]]>
</prerequisite_notes_xlate_part>
    </prerequisite_notes_xlate>
    <prerequisite_notes_xlate lang="tw">
      <prerequisite_notes_xlate_part>
<![CDATA[<p>The &quot;iLO 5 Channel Interface Driver&rdquo; (CHIF) for Windows which is available from Service Pack for ProLiant (SPP).</p>
]]>
</prerequisite_notes_xlate_part>
    </prerequisite_notes_xlate>
  </prerequisite_notes>
  <installation_notes>
    <installation_notes_xlate lang="en">
      <installation_notes_xlate_part>
<![CDATA[<p>To update firmware from Windows operating system on target server:</p>

<p>1.&nbsp;&nbsp;&nbsp;&nbsp; Place the Component in a temporary directory.<br />
2.&nbsp;&nbsp;&nbsp;&nbsp; From the same directory, run the Component by double-clicking it.<br />
3.&nbsp;&nbsp;&nbsp;&nbsp; When the Component dialog window displays, click the Install button to initiate the firmware upgrade.<br />
4.&nbsp;&nbsp;&nbsp;&nbsp; Reboot your system if you would like the update to take effect immediately.</p>

<p><br />
&nbsp;<strong>Supplemental updates</strong> for supported ProLiant servers and options can be done by using&nbsp;Smart Update Manager, which is found on the Service Pack for ProLiant ISO.</p>

<ul>
	<li>Place the Service Pack for ProLiant on a USB key using the USB Key Creator Utility.</li>
	<li>Place the desired&nbsp;components&nbsp;to be updated in the directory, \packages on the USB key.</li>
</ul>

<p>Update the firmware and software&nbsp;in the usual manner.</p>
]]>
</installation_notes_xlate_part>
    </installation_notes_xlate>
    <installation_notes_xlate lang="cn">
      <installation_notes_xlate_part>
<![CDATA[<p>To update firmware from Windows operating system on target server:</p>

<p>1.&nbsp;&nbsp;&nbsp;&nbsp; Place the Component in a temporary directory.<br />
2.&nbsp;&nbsp;&nbsp;&nbsp; From the same directory, run the Component by double-clicking it.<br />
3.&nbsp;&nbsp;&nbsp;&nbsp; When the Component dialog window displays, click the Install button to initiate the firmware upgrade.<br />
4.&nbsp;&nbsp;&nbsp;&nbsp; Reboot your system if you would like the update to take effect immediately.</p>

<p><br />
&nbsp;<strong>Supplemental updates</strong> for supported ProLiant servers and options can be done by using&nbsp;Smart Update Manager, which is found on the Service Pack for ProLiant ISO.</p>

<ul>
	<li>Place the Service Pack for ProLiant on a USB key using the USB Key Creator Utility.</li>
	<li>Place the desired&nbsp;components&nbsp;to be updated in the directory, \packages on the USB key.</li>
</ul>

<p>Update the firmware and software&nbsp;in the usual manner.</p>
]]>
</installation_notes_xlate_part>
    </installation_notes_xlate>
    <installation_notes_xlate lang="ja">
      <installation_notes_xlate_part>
<![CDATA[<p>ターゲットサーバー上のWindowsオペレーティングシステムからファームウェアをアップデートするには、以下の手順に従ってください。</p>

<p>1.      コンポーネントをテンポラリディレクトリに置きます。<br />
2.     同じディレクトリからダブルクリックしてコンポーネントを実行します。<br />
3.     コンポーネントダイアログウィンドウが表示されたら、ファームウェアアップグレードを実行するためにインストールボタンをクリックします。<br />
4.      アップデートをすぐに適用したい場合は、ご使用のシステムを再起動してください。</p>

<p><br />
 サポートされるProLiantサーバーおよびオプションのための<strong>サプリメンタルアップデート</strong>は、Service Pack for ProLiant ISOにあるSmart Update Managerから行うことができます。</p>

<ul>
	<li>USB Key Utilityを使用して、Service Pack for ProLiantをUSBキーにコピーします。</li>
	<li>アップデートする予定のコンポーネントをUSBキーの\packagesディレクトリにコピーします。</li>
</ul>

<p>通常の手順でファームウェアおよびソフトウェアをアップデートします。</p>
]]>
</installation_notes_xlate_part>
    </installation_notes_xlate>
    <installation_notes_xlate lang="ko">
      <installation_notes_xlate_part>
<![CDATA[<p>To update firmware from Windows operating system on target server:</p>

<p>1.&nbsp;&nbsp;&nbsp;&nbsp; Place the Component in a temporary directory.<br />
2.&nbsp;&nbsp;&nbsp;&nbsp; From the same directory, run the Component by double-clicking it.<br />
3.&nbsp;&nbsp;&nbsp;&nbsp; When the Component dialog window displays, click the Install button to initiate the firmware upgrade.<br />
4.&nbsp;&nbsp;&nbsp;&nbsp; Reboot your system if you would like the update to take effect immediately.</p>

<p><br />
&nbsp;<strong>Supplemental updates</strong> for supported ProLiant servers and options can be done by using&nbsp;Smart Update Manager, which is found on the Service Pack for ProLiant ISO.</p>

<ul>
	<li>Place the Service Pack for ProLiant on a USB key using the USB Key Creator Utility.</li>
	<li>Place the desired&nbsp;components&nbsp;to be updated in the directory, \packages on the USB key.</li>
</ul>

<p>Update the firmware and software&nbsp;in the usual manner.</p>
]]>
</installation_notes_xlate_part>
    </installation_notes_xlate>
    <installation_notes_xlate lang="tw">
      <installation_notes_xlate_part>
<![CDATA[<p>To update firmware from Windows operating system on target server:</p>

<p>1.&nbsp;&nbsp;&nbsp;&nbsp; Place the Component in a temporary directory.<br />
2.&nbsp;&nbsp;&nbsp;&nbsp; From the same directory, run the Component by double-clicking it.<br />
3.&nbsp;&nbsp;&nbsp;&nbsp; When the Component dialog window displays, click the Install button to initiate the firmware upgrade.<br />
4.&nbsp;&nbsp;&nbsp;&nbsp; Reboot your system if you would like the update to take effect immediately.</p>

<p><br />
&nbsp;<strong>Supplemental updates</strong> for supported ProLiant servers and options can be done by using&nbsp;Smart Update Manager, which is found on the Service Pack for ProLiant ISO.</p>

<ul>
	<li>Place the Service Pack for ProLiant on a USB key using the USB Key Creator Utility.</li>
	<li>Place the desired&nbsp;components&nbsp;to be updated in the directory, \packages on the USB key.</li>
</ul>

<p>Update the firmware and software&nbsp;in the usual manner.</p>
]]>
</installation_notes_xlate_part>
    </installation_notes_xlate>
  </installation_notes>
  <availability_notes/>
  <documentation_notes/>
  <revision_history>
    <revision>
      <version value="3.00_10-19-2023" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.90_07-20-2023" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zh update which provides mitigation for security vulnerabilities documented as CVE-2023-2650.</p><p></p><p>Addressed an issue where iLO embedded device health info would display blank content under RBSU when the Language was set to Japanese or Chinese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zh update which provides mitigation for security vulnerabilities documented as CVE-2023-2650.</p><p></p><p>Addressed an issue where iLO embedded device health info would display blank content under RBSU when the Language was set to Japanese or Chinese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2023.3ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし        <p><strong>修正された問題：</strong></p><p>このシステムROMのリビジョンには、BIOSアドバイザリと、CVE-2022-43505およびCVE-2022-40982として文書化されているセキュリティ上の脆弱性に対するインテルの緩和策を提供するインテルIPU 2023.3 BIOSアップデートの最新リビジョンが含まれています。このセキュリティ上の脆弱性は、CVEレポートサイトに記録されています。この問題は、HPEサーバーに固有のものではありません。</p><p></p><p>このシステムROMのリビジョンには、CVE-2023-2650として文書化されているセキュリティ上の脆弱性を緩和するOpenSSLライブラリ1.0.2zhアップデートのリビジョンが含まれています。</p><p></p><p>言語が日本語または中国語に設定されている場合に、RBSUでiLO内蔵デバイスのヘルス情報に空白のコンテンツが表示される問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zh update which provides mitigation for security vulnerabilities documented as CVE-2023-2650.</p><p></p><p>Addressed an issue where iLO embedded device health info would display blank content under RBSU when the Language was set to Japanese or Chinese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zh update which provides mitigation for security vulnerabilities documented as CVE-2023-2650.</p><p></p><p>Addressed an issue where iLO embedded device health info would display blank content under RBSU when the Language was set to Japanese or Chinese.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.80_04-20-2023" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-38087. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>Addressed the issue where the system might hang due to invalid memory free and usage when TPM is enabled.</p><p></p><p>Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203 does not populate in some cases.</p><p> </p><p>Addressed the issue where the power-on-password dialog popped up even though user did not set the password.</p><p></p><p>Addressed the issue where the TPM status between RBSU and iLO web pages was not synchronized.</p><p></p><p>Addressed the issue where BIOS does not correctly log memory error data and memory health telemetry in AHS.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-38087. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>Addressed the issue where the system might hang due to invalid memory free and usage when TPM is enabled.</p><p></p><p>Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203 does not populate in some cases.</p><p> </p><p>Addressed the issue where the power-on-password dialog popped up even though user did not set the password.</p><p></p><p>Addressed the issue where the TPM status between RBSU and iLO web pages was not synchronized.</p><p></p><p>Addressed the issue where BIOS does not correctly log memory error data and memory health telemetry in AHS.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2023.2ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題点:</strong></p><p>このシステムROMのリビジョンには、BIOSアドバイザリと、CVE-2022-38087として文書化されているセキュリティ上の脆弱性に対するインテルの緩和策を提供するインテルIPU 2023.2 BIOSアップデートの最新リビジョンが含まれています。このセキュリティ上の脆弱性は、CVEレポートサイトに記録されています。この問題は、HPEサーバーに固有のものではありません。</p><p></p><p>TPMが有効になっているときにメモリの空き容量と使用率が無効なためにシステムがハングする可能性がある問題に対処しました。</p><p></p><p>OEM SMBIOSタイプ203のPCIeデバイスのシリアル番号が入力されない場合がある問題に対処しました。</p><p> </p><p>ユーザーがパスワードを設定していない場合でも、電源投入時パスワードダイアログがポップアップ表示される問題に対処しました。</p><p></p><p>RBSUとiLO Webページ間のTPMステータスが同期されない問題に対処しました。</p><p></p><p>BIOSがAHSにメモリエラーデータとメモリヘルステレメトリを正しく記録しない問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし
        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-38087. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>Addressed the issue where the system might hang due to invalid memory free and usage when TPM is enabled.</p><p></p><p>Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203 does not populate in some cases.</p><p> </p><p>Addressed the issue where the power-on-password dialog popped up even though user did not set the password.</p><p></p><p>Addressed the issue where the TPM status between RBSU and iLO web pages was not synchronized.</p><p></p><p>Addressed the issue where BIOS does not correctly log memory error data and memory health telemetry in AHS.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-38087. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>Addressed the issue where the system might hang due to invalid memory free and usage when TPM is enabled.</p><p></p><p>Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203 does not populate in some cases.</p><p> </p><p>Addressed the issue where the power-on-password dialog popped up even though user did not set the password.</p><p></p><p>Addressed the issue where the TPM status between RBSU and iLO web pages was not synchronized.</p><p></p><p>Addressed the issue where BIOS does not correctly log memory error data and memory health telemetry in AHS.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.78_03-16-2023" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where servers may stop responding during boot when the Intel TXT function is enabled.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where servers may stop responding during boot when the Intel TXT function is enabled.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>なし<p><strong>ファームウェアの依存関係:</strong></p>なし
        <p><strong>修正された問題点：</strong></p><p>インテルTXT機能が有効になっている場合、起動中にサーバーが応答を停止することがある問題に対処しました。</p><p><strong>既知の問題点:</strong></p>なし
        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where servers may stop responding during boot when the Intel TXT function is enabled.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where servers may stop responding during boot when the Intel TXT function is enabled.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.76_02-09-2023" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added new System Configuration (RBSU) configuration options that allow enabling and disabling EPP (Energy Performance Preference) when “Workload Profile” sets to “Custom” and “Power Regulator” sets to “OS Control Mode”.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added new System Configuration (RBSU) configuration options that allow enabling and disabling EPP (Energy Performance Preference) when “Workload Profile” sets to “Custom” and “Power Regulator” sets to “OS Control Mode”.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>[ワークロードプロファイル]が[カスタム]に設定され、[パワーレギュレーター]が[OS制御モード]に設定されている場合にEPP（エネルギーパフォーマンス初期設定）を有効/無効にできる、システム構成（RBSU）の新しい構成オプションを追加しました。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added new System Configuration (RBSU) configuration options that allow enabling and disabling EPP (Energy Performance Preference) when “Workload Profile” sets to “Custom” and “Power Regulator” sets to “OS Control Mode”.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added new System Configuration (RBSU) configuration options that allow enabling and disabling EPP (Energy Performance Preference) when “Workload Profile” sets to “Custom” and “Power Regulator” sets to “OS Control Mode”.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the zlib library 1.2.13 update which provides mitigation for and security vulnerabilities documented as CVE-2022-37434. This issue is not unique to HPE servers.</p><p></p><p>Addressed an issue that system will hang when BIOS tries to print a large IML message on POST screen.</p><p></p><p>Addressed an issue when system discovers thousands of LUNs and was trying to create thousands of boot options for each LUNs. System cannot add, delete or adjust new boot options on iLO web and RBSU after rebooting. System becomes unstable unless loading manufacture default.</p><p></p><p>Addressed an issue where some Chinese and Japanese translations were missing in RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the zlib library 1.2.13 update which provides mitigation for and security vulnerabilities documented as CVE-2022-37434. This issue is not unique to HPE servers.</p><p></p><p>Addressed an issue that system will hang when BIOS tries to print a large IML message on POST screen.</p><p></p><p>Addressed an issue when system discovers thousands of LUNs and was trying to create thousands of boot options for each LUNs. System cannot add, delete or adjust new boot options on iLO web and RBSU after rebooting. System becomes unstable unless loading manufacture default.</p><p></p><p>Addressed an issue where some Chinese and Japanese translations were missing in RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2023.1ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題点:</strong></p><p>このシステムROMのリビジョンには、BIOSアドバイザリと、CVE-2022-32231およびCVE-2022-26343として文書化されているセキュリティ上の脆弱性に対するインテルの緩和策を提供するインテルIPU 2023.1 BIOSアップデートの最新リビジョンが含まれています。このセキュリティ上の脆弱性は、CVEレポートサイトに記録されています。この問題は、HPEサーバーに固有のものではありません。</p><p></p><p>このシステムROMのリビジョンには、CVE-2022-37434として文書化されているセキュリティ上の脆弱性を緩和するzlibライブラリ1.2.13アップデートのリビジョンが含まれています。この問題は、HPEサーバーに固有のものではありません。</p><p></p><p>BIOSがサイズの大きいIMLメッセージをPOST画面に出力しようとしたときにシステムがハングする問題に対処しました。</p><p></p><p>システムが数千のLUNを検出し、LUNごとに数千のブートオプションを作成しようとした際の問題に対処しました。システムの再起動後に、iLO WebおよびRBSUで新しいブートオプションを追加、削除、または調整することはできません。製造時のデフォルトを読み込まないとシステムが不安定になります。</p><p></p><p>RBSUで一部の中国語と日本語の翻訳が欠落している問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし
        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the zlib library 1.2.13 update which provides mitigation for and security vulnerabilities documented as CVE-2022-37434. This issue is not unique to HPE servers.</p><p></p><p>Addressed an issue that system will hang when BIOS tries to print a large IML message on POST screen.</p><p></p><p>Addressed an issue when system discovers thousands of LUNs and was trying to create thousands of boot options for each LUNs. System cannot add, delete or adjust new boot options on iLO web and RBSU after rebooting. System becomes unstable unless loading manufacture default.</p><p></p><p>Addressed an issue where some Chinese and Japanese translations were missing in RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the zlib library 1.2.13 update which provides mitigation for and security vulnerabilities documented as CVE-2022-37434. This issue is not unique to HPE servers.</p><p></p><p>Addressed an issue that system will hang when BIOS tries to print a large IML message on POST screen.</p><p></p><p>Addressed an issue when system discovers thousands of LUNs and was trying to create thousands of boot options for each LUNs. System cannot add, delete or adjust new boot options on iLO web and RBSU after rebooting. System becomes unstable unless loading manufacture default.</p><p></p><p>Addressed an issue where some Chinese and Japanese translations were missing in RBSU.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.72_09-29-2022" revision="" type_of_change="0"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated Intel Optane Memory UEFI driver.</p><p></p><p>Added support to show manufacturing date for DIMMs in SMBIOS.</p><p></p><p>Improved the description of Memory Failed Events in the Integrated Management Log (IML).</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated Intel Optane Memory UEFI driver.</p><p></p><p>Added support to show manufacturing date for DIMMs in SMBIOS.</p><p></p><p>Improved the description of Memory Failed Events in the Integrated Management Log (IML).</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>インテルOptaneメモリUEFIドライバーをアップデートしました。</p><p></p><p>SMBIOSでDIMMの製造日を表示するためのサポートが追加されました。</p><p></p><p>インテグレーテッドマネジメントログ（IML）内のメモリの障害イベントの説明を改善しました。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated Intel Optane Memory UEFI driver.</p><p></p><p>Added support to show manufacturing date for DIMMs in SMBIOS.</p><p></p><p>Improved the description of Memory Failed Events in the Integrated Management Log (IML).</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated Intel Optane Memory UEFI driver.</p><p></p><p>Added support to show manufacturing date for DIMMs in SMBIOS.</p><p></p><p>Improved the description of Memory Failed Events in the Integrated Management Log (IML).</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where a server running the ESXi hypervisor a with TPM module installed would halt on loading modules after the installation of the hypervisor OS, with the message "TPM log extend failed".</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where a server running the ESXi hypervisor a with TPM module installed would halt on loading modules after the installation of the hypervisor OS, with the message "TPM log extend failed".</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2022.3ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題点：</strong></p><p>TPMモジュールがインストールされていてESXiハイパーバイザーが実行されているサーバーが、ハイパーバイザーOSのインストール後、モジュールのロード中に停止し、"TPM log extend failed"というメッセージが表示される問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where a server running the ESXi hypervisor a with TPM module installed would halt on loading modules after the installation of the hypervisor OS, with the message "TPM log extend failed".</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where a server running the ESXi hypervisor a with TPM module installed would halt on loading modules after the installation of the hypervisor OS, with the message "TPM log extend failed".</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.68_07-14-2022" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for One Button Secure Erase (OBSE) and encryption for Broadcom MR controller series on Intel Gen10 systems.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for One Button Secure Erase (OBSE) and encryption for Broadcom MR controller series on Intel Gen10 systems.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for One Button Secure Erase (OBSE) and encryption for Broadcom MR controller series on Intel Gen10 systems.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for One Button Secure Erase (OBSE) and encryption for Broadcom MR controller series on Intel Gen10 systems.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for One Button Secure Erase (OBSE) and encryption for Broadcom MR controller series on Intel Gen10 systems.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the warning message &quot;Component Not Signed&quot; might be displayed for SHA-384 signed components. This issue will be resolved in a future version of SUM. For details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00125612en_us.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of openSSL which provides mitigation for BIOS security vulnerability documented as CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of FreeType library which provides mitigations for security vulnerabilities documented as CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system will hang with Red Screen of Death (RSOD) in ROM Based Setup Utility (RBSU) when user tries to switch [Image Description] choices for NVMe devices under the Firmware Update Page.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the warning message &quot;Component Not Signed&quot; might be displayed for SHA-384 signed components. This issue will be resolved in a future version of SUM. For details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00125612en_us.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of openSSL which provides mitigation for BIOS security vulnerability documented as CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of FreeType library which provides mitigations for security vulnerabilities documented as CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system will hang with Red Screen of Death (RSOD) in ROM Based Setup Utility (RBSU) when user tries to switch [Image Description] choices for NVMe devices under the Firmware Update Page.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the warning message &quot;Component Not Signed&quot; might be displayed for SHA-384 signed components. This issue will be resolved in a future version of SUM. For details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00125612en_us.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of openSSL which provides mitigation for BIOS security vulnerability documented as CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of FreeType library which provides mitigations for security vulnerabilities documented as CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system will hang with Red Screen of Death (RSOD) in ROM Based Setup Utility (RBSU) when user tries to switch [Image Description] choices for NVMe devices under the Firmware Update Page.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the warning message &quot;Component Not Signed&quot; might be displayed for SHA-384 signed components. This issue will be resolved in a future version of SUM. For details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00125612en_us.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of openSSL which provides mitigation for BIOS security vulnerability documented as CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of FreeType library which provides mitigations for security vulnerabilities documented as CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system will hang with Red Screen of Death (RSOD) in ROM Based Setup Utility (RBSU) when user tries to switch [Image Description] choices for NVMe devices under the Firmware Update Page.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the warning message &quot;Component Not Signed&quot; might be displayed for SHA-384 signed components. This issue will be resolved in a future version of SUM. For details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00125612en_us.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of openSSL which provides mitigation for BIOS security vulnerability documented as CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of FreeType library which provides mitigations for security vulnerabilities documented as CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system will hang with Red Screen of Death (RSOD) in ROM Based Setup Utility (RBSU) when user tries to switch [Image Description] choices for NVMe devices under the Firmware Update Page.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.66_05-17-2022" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for HPE MegaRAID Gen10 Plus Storage Controllers MR216i-a and MR416i-a.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for HPE MegaRAID Gen10 Plus Storage Controllers MR216i-a and MR416i-a.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>HPE MegaRAID Gen10 PlusストレージコントローラーMR216i-aおよびMR416i-aのサポートが追加されました。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for HPE MegaRAID Gen10 Plus Storage Controllers MR216i-a and MR416i-a.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added support for HPE MegaRAID Gen10 Plus Storage Controllers MR216i-a and MR416i-a.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of openSSL and LibPng which provides mitigation for BIOS security vulnerabilities documented as CVE-2022-1292 and CVE-2019-7317.  This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue of an incomplete mitigation for a BIOS advisory and security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and CVE-2021-33124.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of openSSL and LibPng which provides mitigation for BIOS security vulnerabilities documented as CVE-2022-1292 and CVE-2019-7317.  This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue of an incomplete mitigation for a BIOS advisory and security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and CVE-2021-33124.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、Intel Platform Update (IPU)バージョンIPU.2022.1ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし        <p><strong>修正された問題点：</strong></p><p>このシステムROMのリビジョンには、CVE-2022-1292およびCVE-2019-7317として文書化されているBIOSセキュリティ脆弱性を緩和するopenSSLおよびLibPngの最新リビジョンが含まれています。このセキュリティ上の脆弱性は、CVEレポートサイトに記録されています。この問題は、HPEサーバーに固有のものではありません。</p><p>BIOSアドバイザリと、CVE-2021-0159、CVE-2021-33123、CVE-2021-33124として記録されているセキュリティ脆弱性の緩和が不完全である問題に対処しました。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-00601 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p><p><strong>既知の問題点：</strong></p>なし        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of openSSL and LibPng which provides mitigation for BIOS security vulnerabilities documented as CVE-2022-1292 and CVE-2019-7317.  This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue of an incomplete mitigation for a BIOS advisory and security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and CVE-2021-33124.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of openSSL and LibPng which provides mitigation for BIOS security vulnerabilities documented as CVE-2022-1292 and CVE-2019-7317.  This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue of an incomplete mitigation for a BIOS advisory and security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and CVE-2021-33124.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.64_04-21-2022" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032.  This issue is not unique to HPE servers.</p><p>
Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p><p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p><p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode. </p><p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p><p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62.  For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032.  This issue is not unique to HPE servers.</p><p>
Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p><p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p><p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode. </p><p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p><p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62.  For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2022.1ガイダンスに沿ったアップデートが含まれています。<p><strong>ファームウェアの依存関係：</strong></p>なし        <p><strong>修正された問題点：</strong></p><p>このシステムROMのリビジョンには、CVE-2022-21166およびCVE-2021-21131として文書化されたセキュリティ上の脆弱性に対する緩和策を提供するインテル製マイクロコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-00616 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p><p>このシステムROMのリビジョンには、CVE-2021-0189、CVE-2021-0159、CVE-2021-33123、CVE-2021-33124、およびCVE-2021-33159として文書化されたBIOSアドバイザリおよびセキュリティ上の脆弱性に対する緩和策を提供するインテルリファレンスコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリ INTEL-SA-00601 および INTEL-SA-00610 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p><p>このシステムROMのリビジョンには、CVE-2018-25032として文書化されたセキュリティ上の脆弱性に対する緩和策を提供するzlibライブラリの最新リビジョンが含まれています。この問題は、HPEサーバーに固有のものではありません。</p><p>
ROMベースセットアップユーティリティ（RBSU）の言語設定が英語以外の場合に、システムROMにストレージコントローラーの製品名が表示されない問題に対処します。</p><p>ウォッチドッグタイマーがタイムアウトすると、システムが再起動でループする問題に対処します。</p><p>アドバンストメモリプロテクション（AMP）でアドバンストECCが選択されている問題に対処します。このオプションは、カスタムワークロードモードの場合に強制的にHPEファーストフォルトトレラント（ADDDC）になります。</p><p>カスタムワークロードモードでアドバンストメモリプロテクション（AMP）モードを設定できる問題に対処します。</p><p>システムROMをバージョン2.60から2.62にアップデートした後、アドバンストメモリプロテクション（AMP）モードがADDDCに戻らない問題に対処します。詳細については、次のアドバイザリを参照してください。https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p><p><strong>既知の問題点：</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032.  This issue is not unique to HPE servers.</p><p>
Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p><p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p><p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode. </p><p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p><p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62.  For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerability documented as CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33159.  These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of zlib library which provides mitigations for security vulnerability documented as CVE-2018-25032.  This issue is not unique to HPE servers.</p><p>
Addresses an issue where the system ROM does not display Storage controller product names when the ROM Based Setup Utility (RBSU) language setting is non-English.</p><p>Addresses an issue where the system would loop in reboot once the watchdog timer times out.</p><p>Addresses an issue where Advanced ECC is selected in Advanced Memory Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC) when in custom workload mode. </p><p>Addresses an issue where Advanced Memory Protection (AMP) mode can be set while in custom workload mode.</p><p>Addresses an issue where Advanced Memory Protection (AMP) mode does not change back to ADDDC after updating system ROM from version 2.60 to 2.62.  For more details on this please check the following advisory: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.62_03-08-2022" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This System ROM should be considered Critical for any systems using the v2.60 revision of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the Advanced Memory Protection (AMP) mode was incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode after updating to Sysrom ROM 01/13/2022 v2.60.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This System ROM should be considered Critical for any systems using the v2.60 revision of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the Advanced Memory Protection (AMP) mode was incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode after updating to Sysrom ROM 01/13/2022 v2.60.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>このシステムROMは、システムROMのv2.60リビジョンを使用するシステムにとってクリティカルと見なされます。<p><strong>ファームウェアの依存関係:</strong></p>なし  <p><strong>修正された問題点：</strong></p><p>システムROM 01/13/2022 v2.60にアップデートした後、HPEファーストフォルトトレラント（ADDDC）モードのアドバンストECCにアドバンストメモリプロテクション（AMP）モードが誤って強制される問題に対処しました。</p><p><strong>既知の問題点:</strong></p>なし  ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This System ROM should be considered Critical for any systems using the v2.60 revision of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the Advanced Memory Protection (AMP) mode was incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode after updating to Sysrom ROM 01/13/2022 v2.60.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This System ROM should be considered Critical for any systems using the v2.60 revision of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the Advanced Memory Protection (AMP) mode was incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode after updating to Sysrom ROM 01/13/2022 v2.60.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.60_01-13-2022" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides BIOS mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues are not unique to HPE servers. </p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides Authenticated Code Module (ACM) mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099, CVE-2021-0103,
CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124. These issues are not unique to HPE servers.</p><p>Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently and may log the following System Overheating message in the Integrated Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles installation."</p><p>Addressed an issue where the system may not automatically restart due to a hang condition during the boot process after a cold boot when the IPMI Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides BIOS mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues are not unique to HPE servers. </p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides Authenticated Code Module (ACM) mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099, CVE-2021-0103,
CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124. These issues are not unique to HPE servers.</p><p>Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently and may log the following System Overheating message in the Integrated Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles installation."</p><p>Addressed an issue where the system may not automatically restart due to a hang condition during the boot process after a cold boot when the IPMI Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides BIOS mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues are not unique to HPE servers. </p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides Authenticated Code Module (ACM) mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099, CVE-2021-0103,
CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124. These issues are not unique to HPE servers.</p><p>Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently and may log the following System Overheating message in the Integrated Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles installation."</p><p>Addressed an issue where the system may not automatically restart due to a hang condition during the boot process after a cold boot when the IPMI Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides BIOS mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues are not unique to HPE servers. </p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides Authenticated Code Module (ACM) mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099, CVE-2021-0103,
CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124. These issues are not unique to HPE servers.</p><p>Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently and may log the following System Overheating message in the Integrated Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles installation."</p><p>Addressed an issue where the system may not automatically restart due to a hang condition during the boot process after a cold boot when the IPMI Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides BIOS mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues are not unique to HPE servers. </p><p>This revision of the System ROM includes Intel Platform Update 2021.2. It provides Authenticated Code Module (ACM) mitigations for security vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099, CVE-2021-0103,
CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124. These issues are not unique to HPE servers.</p><p>Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently and may log the following System Overheating message in the Integrated Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles installation."</p><p>Addressed an issue where the system may not automatically restart due to a hang condition during the boot process after a cold boot when the IPMI Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.58_11-24-2021" revision="" type_of_change="2"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue that can result in Corrected Memory Error Threshold Events being logged to the Integrated Management Log (IML) incorrectly.  The system monitors corrected memory errors and notifies the user via a Corrected Memory Error Threshold Event when action is recommended due to an increased risk of an uncorrected memory error.  Previous versions of the System ROM may log a Corrected Memory Error Threshold Event in cases where the system is not at an increased risk of an uncorrected memory error.  It is strongly recommended that the System ROM be updated to this version or later before replacing DIMMs due to Corrected Memory Error Threshold Events.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue that can result in Corrected Memory Error Threshold Events being logged to the Integrated Management Log (IML) incorrectly.  The system monitors corrected memory errors and notifies the user via a Corrected Memory Error Threshold Event when action is recommended due to an increased risk of an uncorrected memory error.  Previous versions of the System ROM may log a Corrected Memory Error Threshold Event in cases where the system is not at an increased risk of an uncorrected memory error.  It is strongly recommended that the System ROM be updated to this version or later before replacing DIMMs due to Corrected Memory Error Threshold Events.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>なし<p><strong>ファームウェアの依存関係：</strong></p>なし        <p><strong>修正された問題:</strong></p><p>訂正済みメモリエラーしきい値イベントがインテグレーテッドマネジメントログ（IML）に記録される可能性がある問題に対処しました。修正されたメモリーエラーを監視し、未修正のメモリーエラーのリスクが高まるため対処が推奨される場合、Corrected Memory Error Threshold Eventを通じてユーザーに通知します。システムROMの以前のバージョンでは、システムが未修正のメモリエラーのリスクが高くない場合に、修正済みメモリエラーしきい値イベントをログに記録することがあります。訂正済みメモリエラーしきい値イベントのためにDIMMを交換する前に、システムROMをこのバージョンまたはそれ以降にアップデートすることを強くお勧めします。</p><p><strong>既知の問題点:</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue that can result in Corrected Memory Error Threshold Events being logged to the Integrated Management Log (IML) incorrectly.  The system monitors corrected memory errors and notifies the user via a Corrected Memory Error Threshold Event when action is recommended due to an increased risk of an uncorrected memory error.  Previous versions of the System ROM may log a Corrected Memory Error Threshold Event in cases where the system is not at an increased risk of an uncorrected memory error.  It is strongly recommended that the System ROM be updated to this version or later before replacing DIMMs due to Corrected Memory Error Threshold Events.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue that can result in Corrected Memory Error Threshold Events being logged to the Integrated Management Log (IML) incorrectly.  The system monitors corrected memory errors and notifies the user via a Corrected Memory Error Threshold Event when action is recommended due to an increased risk of an uncorrected memory error.  Previous versions of the System ROM may log a Corrected Memory Error Threshold Event in cases where the system is not at an increased risk of an uncorrected memory error.  It is strongly recommended that the System ROM be updated to this version or later before replacing DIMMs due to Corrected Memory Error Threshold Events.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.56_10-28-2021" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2021-0157. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0562. The Intel microcode patch included in this release is version 0x05003208 (CPUID 50567).   These issues impacts 2nd Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation Intel Xeon Scalable Processors. These issues are not unique to HPE servers.</p><p>Addressed an issue in which a server may fail to boot and experience a Machine Check Exception indicating "x64 Exception type 0x12:  An uncorrectable machine check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is installed.</p><p>Addressed an issue where servers with an HPE NS204i-p OS Boot Device may shutdown and log a "System Overheating" error message in the Integrated Management Log (IML).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2021-0157. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0562. The Intel microcode patch included in this release is version 0x05003208 (CPUID 50567).   These issues impacts 2nd Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation Intel Xeon Scalable Processors. These issues are not unique to HPE servers.</p><p>Addressed an issue in which a server may fail to boot and experience a Machine Check Exception indicating "x64 Exception type 0x12:  An uncorrectable machine check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is installed.</p><p>Addressed an issue where servers with an HPE NS204i-p OS Boot Device may shutdown and log a "System Overheating" error message in the Integrated Management Log (IML).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>なし<p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題:</strong></p><p>このシステムROMのリビジョンには、CVE-2021-0157 として文書化されているセキュリティ上の脆弱性に対する緩和策を提供するインテル製マイクロコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-0562 に文書化されています。このリリースに含まれているインテル製マイクロコードパッチは、バージョン0x05003208 (CPUID 50567)です。この問題は、第2世代のインテルXeonスケーラブルプロセッサーに影響します。これらは、第1世代のインテルXeonスケーラブルプロセッサーには影響しません。これらの問題は、HPEサーバーに固有のものではありません。</p><p>サーバーの起動に失敗し、「x64 Exception type 0x12」というMachine Check Exceptionが発生することがあるという問題に対処しました。Fastcom SuperFSCC/4 PCIeカードが取り付けられているときに、CPU1で修正不可能なマシンチェック例外が発生しました。</p><p>HPE NS204i-p OSブートデバイスを搭載したサーバーがシャットダウンし、インテグレーテッドマネジメントログ（IML）に「System Overheating」エラーメッセージが記録される可能性がある問題に対処しました。</p><p><strong>既知の問題点:</strong></p>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2021-0157. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0562. The Intel microcode patch included in this release is version 0x05003208 (CPUID 50567).   These issues impacts 2nd Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation Intel Xeon Scalable Processors. These issues are not unique to HPE servers.</p><p>Addressed an issue in which a server may fail to boot and experience a Machine Check Exception indicating "x64 Exception type 0x12:  An uncorrectable machine check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is installed.</p><p>Addressed an issue where servers with an HPE NS204i-p OS Boot Device may shutdown and log a "System Overheating" error message in the Integrated Management Log (IML).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2021-0157. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0562. The Intel microcode patch included in this release is version 0x05003208 (CPUID 50567).   These issues impacts 2nd Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation Intel Xeon Scalable Processors. These issues are not unique to HPE servers.</p><p>Addressed an issue in which a server may fail to boot and experience a Machine Check Exception indicating "x64 Exception type 0x12:  An uncorrectable machine check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is installed.</p><p>Addressed an issue where servers with an HPE NS204i-p OS Boot Device may shutdown and log a "System Overheating" error message in the Integrated Management Log (IML).</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.54_09-03-2021" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Uncorrectable Memory Errors may be reported and logged to the Integrated Management Log (IML) with certain DIMMs installed and the RBSU &quot;Extended Memory Test&quot; option enabled after updating the System ROM to v2.50 or later.&nbsp;The &ldquo;Extended Memory Test&rdquo; option is disabled by default and this issue would only impact customers who had specifically configured this option to enabled.&nbsp;The reported Uncorrected Memory Errors were due to an issue with the impacted System ROM revisions and do NOT indicate an issue with the DIMMs themselves.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Uncorrectable Memory Errors may be reported and logged to the Integrated Management Log (IML) with certain DIMMs installed and the RBSU &quot;Extended Memory Test&quot; option enabled after updating the System ROM to v2.50 or later.&nbsp;The &ldquo;Extended Memory Test&rdquo; option is disabled by default and this issue would only impact customers who had specifically configured this option to enabled.&nbsp;The reported Uncorrected Memory Errors were due to an issue with the impacted System ROM revisions and do NOT indicate an issue with the DIMMs themselves.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>なし</p>

<p><strong>ファームウェアの依存関係:</strong></p>

<p>なし        </p>

<p><strong>修正された問題：</strong></p>

<p>システムROMをv2.50以降にアップデートした後、特定のDIMMが取り付けられ、RBSUの「拡張メモリテスト」オプションが有効になっていると、修正不可能なメモリエラーが報告されてインテグレーテッドマネージメントログ（IML）に記録される可能性がある問題に対処しました。 「拡張メモリテスト」オプションはデフォルトで無効になっており、この問題は、このオプションを有効に設定したお客様にのみ影響します。 報告された未修正メモリエラーは、影響を受けるシステムROMリビジョンの問題によるものであり、DIMM自体の問題を示すものではありません。</p>

<p><strong>既知の問題点:</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Uncorrectable Memory Errors may be reported and logged to the Integrated Management Log (IML) with certain DIMMs installed and the RBSU &quot;Extended Memory Test&quot; option enabled after updating the System ROM to v2.50 or later.&nbsp;The &ldquo;Extended Memory Test&rdquo; option is disabled by default and this issue would only impact customers who had specifically configured this option to enabled.&nbsp;The reported Uncorrected Memory Errors were due to an issue with the impacted System ROM revisions and do NOT indicate an issue with the DIMMs themselves.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Uncorrectable Memory Errors may be reported and logged to the Integrated Management Log (IML) with certain DIMMs installed and the RBSU &quot;Extended Memory Test&quot; option enabled after updating the System ROM to v2.50 or later.&nbsp;The &ldquo;Extended Memory Test&rdquo; option is disabled by default and this issue would only impact customers who had specifically configured this option to enabled.&nbsp;The reported Uncorrected Memory Errors were due to an issue with the impacted System ROM revisions and do NOT indicate an issue with the DIMMs themselves.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.52_07-08-2021" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added Custom time server PCI riser support.</p>
]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added Custom time server PCI riser support.</p>
]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>カスタムタイムサーバーのPCIライザーのサポートが追加されました。</p>
]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added Custom time server PCI riser support.</p>
]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added Custom time server PCI riser support.</p>
]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet 10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows “null string” in RBSU system information page.</p><p>This revision of the System ROM includes the EDK2 patches which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.</p><p>Addressed an issue where the memory channel numbering is incorrect for Correctable Memory Errors.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet 10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows “null string” in RBSU system information page.</p><p>This revision of the System ROM includes the EDK2 patches which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.</p><p>Addressed an issue where the memory channel numbering is incorrect for Correctable Memory Errors.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>なし<p><strong>ファームウェアの依存関係:</strong></p> なし<p><strong>修正された問題：</strong></p><p>HPE InfiniBand FDR/Ethernet 10Gb/40Gb2ポート544FLR-QSFPアダプターの2番目のポートがRBSUシステム情報ページに「null文字列」を表示する問題に対処しました。</p><p>このシステムROMのリビジョンには、EDK2パッチが含まれており、BIOSアドバイザリおよびCVE-2019-14584、CVE-2021-28211、CVE-2021-28210として文書化されているセキュリティ上の脆弱性に対する緩和策が提供されています。</p><p>修正可能なメモリエラーのメモリチャネル番号が正しくない問題に対処しました。</p><p><strong>既知の問題点:</strong></p>なし
        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet 10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows “null string” in RBSU system information page.</p><p>This revision of the System ROM includes the EDK2 patches which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.</p><p>Addressed an issue where the memory channel numbering is incorrect for Correctable Memory Errors.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet 10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows “null string” in RBSU system information page.</p><p>This revision of the System ROM includes the EDK2 patches which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.</p><p>Addressed an issue where the memory channel numbering is incorrect for Correctable Memory Errors.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.50_05-24-2021" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option to Server Availability called IPMI Watchdog Timer. When enabled, the system will start an IPMI based watchdog timer during boot which can be used to protect against a boot hang or other unexpected system boot issue. It is the responsibility of the user to disable the IPMI watchdog timer once the operating system has booted. Failure to disable the timer can result in an unexpected server reset or shutdown. </p><p>Added a new BIOS/Platform Configuration (RBSU) option to Server Security called UEFI Variable Access Firmware Control. This option, when enabled, can be used to block UEFI Variable writes, such as to the UEFI Boot Order, from the Operating System or a third-party utility. HPE recommends leaving this capability disabled unless the user specifically wants to prevent the operating system's normal operation of writing to UEFI Variables, which typically occur during OS install.</p><p>Updated the BIOS TPM 1.2 support for Windows 2022.</p><p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option to Server Availability called IPMI Watchdog Timer. When enabled, the system will start an IPMI based watchdog timer during boot which can be used to protect against a boot hang or other unexpected system boot issue. It is the responsibility of the user to disable the IPMI watchdog timer once the operating system has booted. Failure to disable the timer can result in an unexpected server reset or shutdown. </p><p>Added a new BIOS/Platform Configuration (RBSU) option to Server Security called UEFI Variable Access Firmware Control. This option, when enabled, can be used to block UEFI Variable writes, such as to the UEFI Boot Order, from the Operating System or a third-party utility. HPE recommends leaving this capability disabled unless the user specifically wants to prevent the operating system's normal operation of writing to UEFI Variables, which typically occur during OS install.</p><p>Updated the BIOS TPM 1.2 support for Windows 2022.</p><p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>IPMIウォッチドッグタイマーと呼ばれる新しいBIOS/プラットフォーム構成（RBSU）オプションがサーバーの可用性に追加されました。有効にすると、システムはブート中にIPMIベースのウォッチドッグタイマーを開始します。これは、ブートハングやその他の予期しないシステムブートの問題から保護するために使用できます。オペレーティングシステムが起動したら、ユーザーの責任でIPMIウォッチドッグタイマーを無効にする必要があります。タイマーを無効にしないと、予期しないサーバーのリセットまたはシャットダウンが発生する可能性があります。</p><p>UEFI可変アクセスファームウェア制御と呼ばれる新しいBIOS/プラットフォーム構成（RBSU）オプションをサーバーセキュリティに追加しました。このオプションを有効にすると、オペレーティングシステムまたはサードパーティユーティリティからのUEFIブート順序などへのUEFI変数の書き込みをブロックするために使用できます。HPEは、通常ではOSインストール時に発生するUEFI変数への書き込みというオペレーティングシステムの通常動作を特に防ぐ場合を除き、この機能を無効にしておくことをお勧めしています。</p><p>Windows 2022の BIOS TPM 1.2サポートをアップデートしました。</p><p>最新のBIOS/プラットフォーム構成オプションと一致するようにHPE RESTful API HPE BIOS属性レジストリリソースをアップデートしました。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option to Server Availability called IPMI Watchdog Timer. When enabled, the system will start an IPMI based watchdog timer during boot which can be used to protect against a boot hang or other unexpected system boot issue. It is the responsibility of the user to disable the IPMI watchdog timer once the operating system has booted. Failure to disable the timer can result in an unexpected server reset or shutdown. </p><p>Added a new BIOS/Platform Configuration (RBSU) option to Server Security called UEFI Variable Access Firmware Control. This option, when enabled, can be used to block UEFI Variable writes, such as to the UEFI Boot Order, from the Operating System or a third-party utility. HPE recommends leaving this capability disabled unless the user specifically wants to prevent the operating system's normal operation of writing to UEFI Variables, which typically occur during OS install.</p><p>Updated the BIOS TPM 1.2 support for Windows 2022.</p><p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option to Server Availability called IPMI Watchdog Timer. When enabled, the system will start an IPMI based watchdog timer during boot which can be used to protect against a boot hang or other unexpected system boot issue. It is the responsibility of the user to disable the IPMI watchdog timer once the operating system has booted. Failure to disable the timer can result in an unexpected server reset or shutdown. </p><p>Added a new BIOS/Platform Configuration (RBSU) option to Server Security called UEFI Variable Access Firmware Control. This option, when enabled, can be used to block UEFI Variable writes, such as to the UEFI Boot Order, from the Operating System or a third-party utility. HPE recommends leaving this capability disabled unless the user specifically wants to prevent the operating system's normal operation of writing to UEFI Variables, which typically occur during OS install.</p><p>Updated the BIOS TPM 1.2 support for Windows 2022.</p><p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.

HPE recommends that customers using Intel Optane Persistent Memory update to this version of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system may experience an Unexpected Shutdown or a Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only impacts systems configured with Intel Optane DC Persistent Memory in one of these modes. HPE recommends updating to this version of the System ROM for any customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed Mode. This issue is not unique to HPE servers. </p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-24511. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-464. The Intel microcode patches included in this release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567). These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and CVE-2020-24486. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00463.  These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which address various functional issues documented in the Intel Technical Specification update. These issues are documented as the EIBRS Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not unique to HPE servers.</p><p>Addressed an issue where the server may become unresponsive during POST or take an unexpected long time to complete POST when the RBSU Extended Memory Test option was enabled. </p><p>Addressed an issue where the server was allowed to boot when mixed SKUs of Intel Xeon Scalable Processors are installed.  The server should display an error message and halt boot in these configurations.</p><p>Addressed an issue where the System ROM was logging a mismatched power supply condition with the latest version of the HPE Power Supplies. When this issue occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or later is also needed.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.

HPE recommends that customers using Intel Optane Persistent Memory update to this version of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system may experience an Unexpected Shutdown or a Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only impacts systems configured with Intel Optane DC Persistent Memory in one of these modes. HPE recommends updating to this version of the System ROM for any customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed Mode. This issue is not unique to HPE servers. </p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-24511. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-464. The Intel microcode patches included in this release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567). These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and CVE-2020-24486. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00463.  These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which address various functional issues documented in the Intel Technical Specification update. These issues are documented as the EIBRS Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not unique to HPE servers.</p><p>Addressed an issue where the server may become unresponsive during POST or take an unexpected long time to complete POST when the RBSU Extended Memory Test option was enabled. </p><p>Addressed an issue where the server was allowed to boot when mixed SKUs of Intel Xeon Scalable Processors are installed.  The server should display an error message and halt boot in these configurations.</p><p>Addressed an issue where the System ROM was logging a mismatched power supply condition with the latest version of the HPE Power Supplies. When this issue occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or later is also needed.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2021.1ガイダンスに沿ったアップデートが含まれています。HPEは、Intel Optane Persistent Memoryを使用しているお客様が、このバージョンのシステムROMにアップデートすることを推奨しています。<p><strong>ファームウェアの依存関係:</strong></p> なし<p><strong>修正された問題：</strong></p><p>Intel Optane DC Persistent Memoryがインストールされ、メモリモード（2LM）または混合モード用に構成されていると、システムで予期しないシャットダウンが発生するか、バンク4またはバンク6のマシンチェックが発生する可能性がある問題に対処しました。この問題は、これらのモードのいずれかでIntel Optane DC Persistent Memoryが構成されているシステムにのみ影響します。HPEは、Intel Optane DC Persistent Memoryをメモリモード（2LM）または混合モードで使用しているすべてのお客様に、このバージョンのシステムROMにアップデートすることを推奨します。この問題は、HPEサーバーに固有のものではありません。</p><p>このシステムROMのリビジョンには、CVE-2020-24511 として文書化されているセキュリティ上の脆弱性に対する緩和策を提供するインテル製マイクロコードの最新リビジョンが含まれています。これらのセキュリティ脆弱性は、Intel Security Advisory INTEL-SA-464に文書化されています。このリリースに含まれているインテル製マイクロコードパッチは、バージョン0x02006B06（CPUID 50654）および0x05003103（CPUID 50567）です。これらの問題は、HPEサーバーに固有のものではありません。</p><p>このシステムROMのリビジョンには、CVE-2020-12358、CVE-2020-12360およびCVE-2020-24486として文書化されたBIOSアドバイザリおよびセキュリティ上の脆弱性の緩和を提供するインテルリファレンスコードの最新リビジョンが含まれています。これらのセキュリティ脆弱性は、Intel Security Advisory INTEL-SA-00463に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p><p>このシステムROMのリビジョンには、インテルテクニカルスペックアップデートに記載されているさまざまな機能問題に対処するインテル製マイクロコードの最新リビジョンが含まれています。これらの問題は、EIBRS Guest/Host and REP MOVS* MCE on Memory Not Access Issueとしてドキュメント化されています。これらの問題は、HPEサーバーに固有のものではありません。</p><p>RBSU拡張メモリテストオプションが有効になっている場合、POST中にサーバーが応答しなくなる、またはPOSTを完了するのに予期しない時間がかかる問題に対処しました。</p><p>インテルXeonスケーラブルプロセッサの混合SKUがインストールされている場合にサーバーが起動できる問題に対処しました。これらの構成では、サーバーはエラーメッセージを表示し、起動を停止する必要があります。</p><p>システムROMが最新バージョンのHPE電源装置との電源装置不一致状態をログに記録していた問題に対処しました。この問題が発生したとき、動的消費電力上限と高効率電源装置モードも無効になっていました。この問題を適切に軽減するには、iLOファームウェアバージョン2.50以降も必要です。</p><p><strong>既知の問題点:</strong></p>なし
        ]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.

HPE recommends that customers using Intel Optane Persistent Memory update to this version of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system may experience an Unexpected Shutdown or a Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only impacts systems configured with Intel Optane DC Persistent Memory in one of these modes. HPE recommends updating to this version of the System ROM for any customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed Mode. This issue is not unique to HPE servers. </p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-24511. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-464. The Intel microcode patches included in this release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567). These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and CVE-2020-24486. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00463.  These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which address various functional issues documented in the Intel Technical Specification update. These issues are documented as the EIBRS Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not unique to HPE servers.</p><p>Addressed an issue where the server may become unresponsive during POST or take an unexpected long time to complete POST when the RBSU Extended Memory Test option was enabled. </p><p>Addressed an issue where the server was allowed to boot when mixed SKUs of Intel Xeon Scalable Processors are installed.  The server should display an error message and halt boot in these configurations.</p><p>Addressed an issue where the System ROM was logging a mismatched power supply condition with the latest version of the HPE Power Supplies. When this issue occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or later is also needed.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.

HPE recommends that customers using Intel Optane Persistent Memory update to this version of the System ROM.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the system may experience an Unexpected Shutdown or a Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only impacts systems configured with Intel Optane DC Persistent Memory in one of these modes. HPE recommends updating to this version of the System ROM for any customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed Mode. This issue is not unique to HPE servers. </p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-24511. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-464. The Intel microcode patches included in this release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567). These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and CVE-2020-24486. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00463.  These issues are not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which address various functional issues documented in the Intel Technical Specification update. These issues are documented as the EIBRS Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not unique to HPE servers.</p><p>Addressed an issue where the server may become unresponsive during POST or take an unexpected long time to complete POST when the RBSU Extended Memory Test option was enabled. </p><p>Addressed an issue where the server was allowed to boot when mixed SKUs of Intel Xeon Scalable Processors are installed.  The server should display an error message and halt boot in these configurations.</p><p>Addressed an issue where the System ROM was logging a mismatched power supply condition with the latest version of the HPE Power Supplies. When this issue occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or later is also needed.</p><p><strong>Known Issues:</strong></p>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<p>システムの稼働時間を改善するために、高速フォールトトレラントメモリモード（ADDDC）のサポートをアップデートしました。</p><p>ダブリン/ロンドン（UTC 1）を追加するために、BIOS/プラットフォーム構成（RBSU）タイムゾーンのサポートが追加されました。このサポートには、最新バージョンのiLOファームウェアバージョン2.40以降も必要です。</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p>

<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is Disabled by default. This issue was introduced in the v2.40 revision of the System ROM.</p>

<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p>

<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p>

<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is Disabled by default. This issue was introduced in the v2.40 revision of the System ROM.</p>

<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p>

<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意:</strong></p>

<p>なし</p>

<p><strong>ファームウェアの依存関係:</strong></p>

<p> なし</p>

<p><strong>修正された問題：</strong></p>

<p>システムROMのこのリビジョンには、インテル製マイクロコードの最新リビジョンが含まれています。これは、命令の短いループを伴う重いストレス下での潜在的なマシンチェック例外の修正を提供します。これにより、インテグレーテッドマネジメントログ（IML）に記録されているように、MSCOD = 0080およびMCACOD = 0400hのバンク3でマシンチェック例外が発生する可能性があります。このリリースに含まれているインテル製マイクロコードパッチは、バージョン0x04003005（CPUID 50656）および0x05003005（CPUID 50657）です。この問題は、第2世代のインテルXeonスケーラブルパフォーマンスプロセッサーにのみ影響します。この問題は、HPEサーバーに固有のものではありません。</p>

<p>システムROMのこのリビジョンには、インテル製マイクロコードの最新リビジョンが含まれています。これは、PCIeで高レベルの割り込みトラフィックが発生した場合の潜在的なマシンチェック例外の修正を提供します。これにより、インテグレーテッドマネジメントログログ（IML）に記録されているように、MSCOD = 000Chのバンク9、10、または11でマシンチェック例外が発生する可能性があります。このリリースに含まれているインテル製マイクロコードパッチは、バージョン0x02006A09（CPUID 50654）、0x04003005（CPUID 50656）、0x05003005（CPUID 50657）です。この変更の一環として、アドバンストパフォーマンスオプションに新しいBIOS/プラットフォーム構成（RBSU）オプションが追加され、お客様がこの緩和策を無効にできるようになりました。この問題は、HPEサーバーに固有のものではありません。</p>

<p>サーバーの起動時にリアルタイムクロックが破損する可能性がある非常にまれな問題に対処しました。これは通常、RTCの年フィールドの予期しない変更として現れましたが、日付と時刻の他の部分に影響を与える可能性があります。この問題は、HPEサーバーに固有のものではありません。</p>

<p>BIOS/プラットフォーム構成（RBSU）で有効に構成されている場合に拡張メモリテストが実行されない問題に対処しました。このオプションはデフォルトでは無効になっていることに注意してください。この問題はシステムROMバージョン2.40で最初に発生したものです。</p>

<p>サーバーがAHCI SATAドライブで構成されている場合に、サーバーシステムのファンが予想よりも高速で動作する可能性がある問題に対処しました。</p>

<p>不良LRDIMMメモリデバイスをマップから除外することはできたが、インテグレーテッドマネジメントログ（IML）に適切に報告できなかった問題に対処しました。この問題は、LRDIMMで構成されたシステムにのみ影響しました。</p>

<p><strong>既知の問題点:</strong></p>

<p>なし
        </p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p>

<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is Disabled by default. This issue was introduced in the v2.40 revision of the System ROM.</p>

<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p>

<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p>

<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is Disabled by default. This issue was introduced in the v2.40 revision of the System ROM.</p>

<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p>

<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.40_10-26-2020" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[メモリオプションに新しいBIOS/プラットフォーム構成(RBSU)オプションを追加しました。Low Watermark設定を選択すると、メモリコントローラーはDDR4RowHammer攻撃の影響を受けにくくなります。Low Watermark設定を有効にすると、メモリパフォーマンスへの影響が見られることが予想されます。システムのデフォルトの動作は変更されていません。追加のRowHammer保護を提供したいお客様は、この設定を有効にする必要があります。<p>BIOS/プラットフォーム構成(RBSU)のサポートが追加され、セキュアブート署名リストを署名付きバイナリファイルとしてインポートおよびエクスポートできるようになりました。これは、UEFIフォーラム(https://uefi.org/revocationlistfile)に記載されているように、Microsoftの失効リストバイナリファイルをSecure Boot DBXにインポートするのに便利です。<p>サードパーティのオプションカードで利用可能な64ビットのメモリマップドI/Oの量を増やすために、システムROMをアップデートしました。<p>最新のHPEオプションデバイスでOne Buttonセキュア消去機能のシステムROM対応をアップデートしました。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにHPE RESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>このバージョンのシステムROMには、インテル製品アップデート(IPU)バージョンIPU.2020.2ガイダンスに沿ったアップデートが含まれています。</p>

<p><strong>ファームウェアの依存関係:</strong></p>

<p>なし</p>

<p><strong>修正された問題：</strong></p>

<p>このバージョンのシステムROMには、チャネルごとに2つのDIMMで構成されたシステムのメモリの安定性を向上させるのに役立つインテルメモリリファレンスコードのアップデートが含まれています。インテルIPU.2.2020リリースに含まれる改善点の詳細については、インテルのサイティングドキュメントを参照してください。この問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMのリビジョンには、CVE-2020-8696 として文書化されているセキュリティ上の脆弱性に対する緩和策を提供するインテル製マイクロコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-0381 に文書化されています。今回のリリースに含まれるインテル製マイクロコードパッチは、バージョン0x02006A08(CPUID 50654)、0x04003003(CPUID 50656)、0x05003003(CPUID 50567)。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMのリビジョンには、CVE-2020-0587、CVE-2020-0588、CVE-2020-0590、CVE-2020-0591、CVE-2020-0592、および CVE-2020-0593 として文書化されたBIOSアドバイザリおよびセキュリティ上の脆弱性の緩和を提供するインテルリファレンスコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-00358 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMのリビジョンには、BIOSプラットフォームのコード勧告および CVE-2020-8738、CVE-2020-8739、CVE-2020-8740、および CVE-2020-8764 として文書化されているセキュリティ上の脆弱性に対する緩和策を提供するインテルリファレンスコードの最新リビジョンが含まれています。これらのセキュリティ上の脆弱性は、インテルセキュリティアドバイザリー INTEL-SA-00390 に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>このリビジョンのシステムROMには、メモリトレーニング中にシステムが再起動ループでスタックする可能性がある問題に対処したインテルリファレンスコードの最新リビジョンが含まれています。この問題はシステムROMバージョン2.30で最初に発生したものです。この問題はHPEサーバーに固有のものではありませんでした。</p>

<p>ACPI SLITテーブルのメモリローカリティが正しく作成されない問題に対処しました。まれに、ACPI SLITの値が正しくないと、システムのパフォーマンスに予期せぬ影響が出ることがあります。この問題はv2.10のシステムROMで発生し、以前のバージョンのシステムROMには影響しませんでした。</p>

<p>VMwareでNVMe Hot-plugとHot-addが正常に機能しない問題に対処しました。この問題は、他のオペレーティングシステムでのNVMe Hot-plugやHot-addには影響しませんでした。</p>

<p>Advanced Double DRAM Device Correction (ADDC)のスペアリング動作中に未修正のメモリ障害が発生した場合、システムがインテグレーテッドマネジメントログ(IML)でメモリ交換イベントを適切にコールアウトしない問題に対処しました。この修正は、これらのイベントの不正なロギングに影響を与えるだけで、修正されていないメモリ障害を引き起こしたり、A3DC機能の動作に変更を加えたりするという点で、システムの正常な動作に影響を与えることはありません。この問題は、高速フォールトトレラントメモリモード(ADDC)用に構成されたシステムにのみ影響します。</p>

<p>拡張メモリテストのBIOS/プラットフォーム構成(RBSU)オプションが、システム再起動後に自動的に無効になる可能性がある問題に対処しました。この問題はv2.30のシステムROMで発生し、以前のバージョンのシステムROMには影響しませんでした。</p>

<p><strong>既知の問題点:</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.36_07-16-2020" revision="" type_of_change="0"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Updated thermal support for the server to include the HPE NS204i-p Controller.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Updated thermal support for the server to include the HPE NS204i-p Controller.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[Updated thermal support for the server to include the HPE NS204i-p Controller.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Updated thermal support for the server to include the HPE NS204i-p Controller.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Updated thermal support for the server to include the HPE NS204i-p Controller.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.34_04-08-2020" revision="" type_of_change="0"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[プラットフォームの最新の熱サポートにアップデートされました。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the serial port would not function properly when the iLO CLI serial interface was also enabled on the platform. This could lead to the serial BAUD rate not being configured properly and the serial output from the host would be corrupted or no output would be seen.<p>Addressed an issue where UEFI Serial Debug output could inadvertently be seen over BIOS Serial Console. This issue would be seen periodically on server reboots. This issue was introduced with System ROM v2.30 and did not impact servers using previous versions of the System ROM.<p>Addressed an extremely rare issue where the system could become unresponsive in POST when configured in Legacy Boot Mode when a USB Mouse is attached. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where boot devices could disappear from the Boot Options menu in the BIOS/Platform Configuration (RBSU) when pressing the F10 or F12 key to save boot order changes.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the serial port would not function properly when the iLO CLI serial interface was also enabled on the platform. This could lead to the serial BAUD rate not being configured properly and the serial output from the host would be corrupted or no output would be seen.<p>Addressed an issue where UEFI Serial Debug output could inadvertently be seen over BIOS Serial Console. This issue would be seen periodically on server reboots. This issue was introduced with System ROM v2.30 and did not impact servers using previous versions of the System ROM.<p>Addressed an extremely rare issue where the system could become unresponsive in POST when configured in Legacy Boot Mode when a USB Mouse is attached. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where boot devices could disappear from the Boot Options menu in the BIOS/Platform Configuration (RBSU) when pressing the F10 or F12 key to save boot order changes.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>なし<P><B>ファームウェアの依存関係:</B></P> なし<P><B>修正された問題点：</B></P>プラットフォーム上でiLO CLIシリアルインターフェイスも有効になっている場合、シリアルポートが正しく機能しない問題に対処しました。これにより、シリアルボーレートが正しく構成されず、ホストからのシリアル出力が破損したり、出力が表示されなくなったりする可能性がありました。<p>UEFIシリアルデバッグ出力がBIOSシリアルコンソールで誤って表示される問題に対処しました。この問題は、サーバーの再起動時に定期的に見られます。この問題はv2.30のシステムROMで発生し、以前のバージョンのシステムROMには影響しませんでした。<p>USBマウスが接続されている場合、レガシーブートモードで構成されているとシステムがPOSTで応答しなくなるという非常にまれな問題に対処しました。この問題は、UEFIブートモードで構成されているシステムには影響しません。<p>起動順序の変更を保存するためにF10キーまたはF12キーを押すと、BIOS/プラットフォーム構成（RBSU）の[起動オプション]メニューから起動デバイスが消える可能性がある問題に対処しました。<P><B>既知の問題点:</B></P> なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the serial port would not function properly when the iLO CLI serial interface was also enabled on the platform. This could lead to the serial BAUD rate not being configured properly and the serial output from the host would be corrupted or no output would be seen.<p>Addressed an issue where UEFI Serial Debug output could inadvertently be seen over BIOS Serial Console. This issue would be seen periodically on server reboots. This issue was introduced with System ROM v2.30 and did not impact servers using previous versions of the System ROM.<p>Addressed an extremely rare issue where the system could become unresponsive in POST when configured in Legacy Boot Mode when a USB Mouse is attached. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where boot devices could disappear from the Boot Options menu in the BIOS/Platform Configuration (RBSU) when pressing the F10 or F12 key to save boot order changes.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the serial port would not function properly when the iLO CLI serial interface was also enabled on the platform. This could lead to the serial BAUD rate not being configured properly and the serial output from the host would be corrupted or no output would be seen.<p>Addressed an issue where UEFI Serial Debug output could inadvertently be seen over BIOS Serial Console. This issue would be seen periodically on server reboots. This issue was introduced with System ROM v2.30 and did not impact servers using previous versions of the System ROM.<p>Addressed an extremely rare issue where the system could become unresponsive in POST when configured in Legacy Boot Mode when a USB Mouse is attached. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where boot devices could disappear from the Boot Options menu in the BIOS/Platform Configuration (RBSU) when pressing the F10 or F12 key to save boot order changes.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.32_03-09-2020" revision="" type_of_change="2"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 5/50/50/60 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 5/50/50/60 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>このバージョンのシステムROMには、HPE Smartアレイs100i UEFIドライバーの最新サポートが含まれています。このシステムROMは、HPE Smartアレイs100iサポートを有効にしているお客様にとって重要です。<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点：</B></P>RAID 5/50/50/60フォールトトレラントモードで構成されたRAIDボリュームの初期構成または操作中に、HPE Smartアレイs100iソフトウェアRAIDで潜在的なデータの不整合が発生する可能性がある問題に対処しました。この問題は、RAID 0または1などの他のRAID構成で構成されたシステムには影響しません。この問題は、Smartアレイs100iサポートを有効にしていないシステムには影響しません。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 5/50/50/60 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains the latest support for the HPE Smart Array s100i UEFI Driver. This system ROM is critical for customers who have enabled the HPE Smart Array s100i support.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 5/50/50/60 Fault Tolerant Modes. This issue does not impact systems configured in other RAID configurations such as RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.30_02-11-2020" revision="" type_of_change="2"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to the Intel Persistent DC Performance Settings called Balanced Performance Mode. This option may improve performance of systems configured with Intel DC Persistent Memory with certain workloads.<p>Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to the Intel Persistent DC Performance Settings called Balanced Performance Mode. This option may improve performance of systems configured with Intel DC Persistent Memory with certain workloads.<p>Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[バランスパフォーマンスモードと呼ばれるIntel Persistent DCパフォーマンス設定に新しいBIOS/プラットフォーム構成（RBSU）オプションを追加しました。このオプションは、特定のワークロードでIntel DC Persistent Memoryで構成されたシステムのパフォーマンスを改善する場合があります。<p>プラットフォームの最新の熱サポートにアップデートされました。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to the Intel Persistent DC Performance Settings called Balanced Performance Mode. This option may improve performance of systems configured with Intel DC Persistent Memory with certain workloads.<p>Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to the Intel Persistent DC Performance Settings called Balanced Performance Mode. This option may improve performance of systems configured with Intel DC Persistent Memory with certain workloads.<p>Updated to the latest thermal support for the platform.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode which addresses a Mesh to Memory Machine Check Exception failure when Fast Fault Tolerant Memory Mode (ADDDC) is enabled. In most cases, this issue results in the log of an Integrated Management Log (IML) Bank 8 or Bank 9 Machine Check Exception with a status of 0xB2000000:00200400 but can also result in a system reset with an Unexpected Shutdown logged. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-0548 and CVE-2020-0549, also known as CacheOut. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00329.  These issues are not unique to HPE servers.<p>Addressed an issue where the server may become unresponsive during POST with a Red Screen Exception (RSOD) when the server was reset (restarted) at the same time that an iLO firmware reset was initiated.  Note that updating iLO firmware results in the reset of iLO firmware.<p>Addressed an issue where the System Utilities System Information data could not be successfully exported to an FTP (network) location. Previously the System Utilities would report the file was saved successfully but no actual information was saved on the network share.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode which addresses a Mesh to Memory Machine Check Exception failure when Fast Fault Tolerant Memory Mode (ADDDC) is enabled. In most cases, this issue results in the log of an Integrated Management Log (IML) Bank 8 or Bank 9 Machine Check Exception with a status of 0xB2000000:00200400 but can also result in a system reset with an Unexpected Shutdown logged. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-0548 and CVE-2020-0549, also known as CacheOut. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00329.  These issues are not unique to HPE servers.<p>Addressed an issue where the server may become unresponsive during POST with a Red Screen Exception (RSOD) when the server was reset (restarted) at the same time that an iLO firmware reset was initiated.  Note that updating iLO firmware results in the reset of iLO firmware.<p>Addressed an issue where the System Utilities System Information data could not be successfully exported to an FTP (network) location. Previously the System Utilities would report the file was saved successfully but no actual information was saved on the network share.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点：</B></P>システムROMのこのリビジョンには、高速フォールトトレラントメモリモード（ADDDC）が有効になっている場合のメッシュツーメモリマシンチェック例外エラーに対処するIntelマイクロコードの最新リビジョンが含まれています。ほとんどの場合、この問題により、ステータスが0xB2000000：00200400のインテグレーテッドマネージメントログ（IML）バンク8またはバンク9 マシンチェック例外のログが生成されますが、予期しないシャットダウンがログに記録されてシステムがリセットされることもあります。この問題は、HPEサーバーに固有のものではありません。<p>システムROMのこのリビジョンには、CVE-2020-0548およびCVE-2020-0549（CacheOutとも呼ばれる）として文書化されたセキュリティ脆弱性の緩和策を提供するIntelマイクロコードの最新リビジョンが含まれています。これらのセキュリティ脆弱性は、Intel Security Advisory INTEL-SA-00329に文書化されています。これらの問題は、HPEサーバーに固有のものではありません。<p>iLOファームウェアのリセットが開始されたのと同時にサーバーがリセット（再起動）されたときに、サーバーがPOST中にレッドスクリーン例外（RSOD）で応答しなくなる問題に対処しました。iLOファームウェアをアップデートすると、iLOファームウェアがリセットされることに注意してください。<p>システムユーティリティのシステム情報データをFTP（ネットワーク）ロケーションに正常にエクスポートできなかった問題に対処しました。以前は、システムユーティリティはファイルが正常に保存されたと報告していましたが、実際の情報はネットワーク共有に保存されていませんでした。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode which addresses a Mesh to Memory Machine Check Exception failure when Fast Fault Tolerant Memory Mode (ADDDC) is enabled. In most cases, this issue results in the log of an Integrated Management Log (IML) Bank 8 or Bank 9 Machine Check Exception with a status of 0xB2000000:00200400 but can also result in a system reset with an Unexpected Shutdown logged. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-0548 and CVE-2020-0549, also known as CacheOut. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00329.  These issues are not unique to HPE servers.<p>Addressed an issue where the server may become unresponsive during POST with a Red Screen Exception (RSOD) when the server was reset (restarted) at the same time that an iLO firmware reset was initiated.  Note that updating iLO firmware results in the reset of iLO firmware.<p>Addressed an issue where the System Utilities System Information data could not be successfully exported to an FTP (network) location. Previously the System Utilities would report the file was saved successfully but no actual information was saved on the network share.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode which addresses a Mesh to Memory Machine Check Exception failure when Fast Fault Tolerant Memory Mode (ADDDC) is enabled. In most cases, this issue results in the log of an Integrated Management Log (IML) Bank 8 or Bank 9 Machine Check Exception with a status of 0xB2000000:00200400 but can also result in a system reset with an Unexpected Shutdown logged. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-0548 and CVE-2020-0549, also known as CacheOut. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00329.  These issues are not unique to HPE servers.<p>Addressed an issue where the server may become unresponsive during POST with a Red Screen Exception (RSOD) when the server was reset (restarted) at the same time that an iLO firmware reset was initiated.  Note that updating iLO firmware results in the reset of iLO firmware.<p>Addressed an issue where the System Utilities System Information data could not be successfully exported to an FTP (network) location. Previously the System Utilities would report the file was saved successfully but no actual information was saved on the network share.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.22_11-13-2019" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[プラットフォームの最新の熱サポートにアップデートされました。<p>システムユーティリティのための言語翻訳（英語以外のモード）をアップデートしました。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM replaces the previously published v2.20 System ROM.  The v2.20 System ROM introduced an issue where a small subset LRDIMMs could experience an uncorrectable memory error. This issue had been previously fixed in the v2.14 ROM of the System ROM.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities.  The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode.  This problem could occur with other optional PCIe graphics adapters.  This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions.  This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map.  The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out.  This change only impacts the IML logging of the error and does not impact the operation of the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM replaces the previously published v2.20 System ROM.  The v2.20 System ROM introduced an issue where a small subset LRDIMMs could experience an uncorrectable memory error. This issue had been previously fixed in the v2.14 ROM of the System ROM.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities.  The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode.  This problem could occur with other optional PCIe graphics adapters.  This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions.  This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map.  The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out.  This change only impacts the IML logging of the error and does not impact the operation of the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>このバージョンのシステムROMは、以前に公開されたv2.20システムROMを置き換えます。v2.20システムROMでは、小さなサブセットのLRDIMMで修正不能なメモリエラーが発生する可能性があるという問題が発生しました。この問題は、システムROMのv2.14 ROMで以前に修正されていました。<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点:</B></P>このシステムROMのリビジョンは、CVE-2019-151に対する緩和策を提供するインテルTrusted eXecution Technology（TXT）の最新サポートが含まれています。この緩和策は、TXTが有効になっているシステムでのみ必要です。この問題は、HPEサーバーに固有のものではありません。<p>このシステムROMのリビジョンは、複数のセキュリティ脆弱性に対する緩和策を提供するインテルリファレンスコードサポートの最新版が含まれています。次の脆弱性は、このシステム ROM リリースで対応済です。CVE-2019-11137、CVE-2019-152、およびCVE-2019-11136。これらの問題は、HPEサーバーに固有のものではありません。<p>システムROMのこのリビジョンには、CVE-2017-5715、CVE-2019-11135、およびCVE-2019-11139の緩和策を提供するインテルマイクロコードの最新リビジョンが含まれています。これらの問題は、HPEサーバーに固有のものではありません。<p>システムROMのこのリビジョンには、インテルマイクロコードの最新リビジョンが含まれています。これは、複雑なマイクロアーキテクチャー条件下で、X87またはAVXまたは整数除算命令を実行すると予測できないシステム動作が発生するインテルSightingを緩和します。この問題は、HPEサーバーに固有のものではありません。<p>iLOとサーバーの両方が同時にリセットされると、POST中にシステムが応答しなくなる問題に対処しました。<p>Matrox GPUが存在し、サーバーがレガシーブートモードで起動している場合、起動中にサーバーでレッドスクリーン（RSOD）が発生する可能性がある問題に対処しました。この問題は、他のオプションのPCIeグラフィックスアダプターで発生する可能性があります。この問題は断続的なものではなく、以前のシステムROMリビジョンの影響を受けるオプションのPCIeグラフィックアダプターを使用するすべてのブートで発生します。この問題は、UEFIブートモードで構成されたサーバーまたは組み込みグラフィックスコントローラーを使用している場合には見られません。<p>DIMMがシステムメモリマップにまだ存在している場合、インテグレーテッドマネージメントログ（IML）でメモリトレーニングの失敗後にDIMMがマップアウトされたことをシステムが誤って報告する可能性がある問題に対処しました。IMLはメモリトレーニングの失敗を正しく示すようになりましたが、DIMMがマップされたことを示しません。この変更は、エラーのIMLロギングにのみ影響し、システムの動作には影響しません。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM replaces the previously published v2.20 System ROM.  The v2.20 System ROM introduced an issue where a small subset LRDIMMs could experience an uncorrectable memory error. This issue had been previously fixed in the v2.14 ROM of the System ROM.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities.  The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode.  This problem could occur with other optional PCIe graphics adapters.  This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions.  This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map.  The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out.  This change only impacts the IML logging of the error and does not impact the operation of the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM replaces the previously published v2.20 System ROM.  The v2.20 System ROM introduced an issue where a small subset LRDIMMs could experience an uncorrectable memory error. This issue had been previously fixed in the v2.14 ROM of the System ROM.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities.  The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode.  This problem could occur with other optional PCIe graphics adapters.  This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions.  This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map.  The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out.  This change only impacts the IML logging of the error and does not impact the operation of the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.20_10-31-2019" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[プラットフォームの最新の熱サポートにアップデートされました。<p>システムユーティリティのための言語翻訳（英語以外のモード）をアップデートしました。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Updated to the latest thermal support for the platform.<p>Updated the language translations (non-English modes) for System Utilities.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities. The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.</p>

<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode. This problem could occur with other optional PCIe graphics adapters. This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions. This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.</p>

<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map. The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out. This change only impacts the IML logging of the error and does not impact the operation of the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities. The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.</p>

<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode. This problem could occur with other optional PCIe graphics adapters. This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions. This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.</p>

<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map. The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out. This change only impacts the IML logging of the error and does not impact the operation of the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>なし</p>

<p><strong>ファームウェアの依存関係：</strong></p>

<p>なし</p>

<p><strong>修正された問題点：</strong></p>

<p>このシステムROMのリビジョンは、CVE-2019-151に対する緩和策を提供するインテル トラステッド エグゼキューション テクノロジー（TXT）の最新サポートが含まれています。この軽減は、TXTが有効になっているシステムでのみ必要です。この問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMのリビジョンは、複数のセキュリティ脆弱性に対する緩和策を提供するインテルリファレンスコードサポートの最新版が含まれています。次の脆弱性は、このシステム ROM リリースで対応済です。CVE-2019-11137、CVE-2019-152、およびCVE-2019-11136。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>システムROMのこのリビジョンには、CVE-2017-5715、CVE-2019-11135、およびCVE-2019-11139の緩和策を提供するインテルマイクロコードの最新リビジョンが含まれています。これらの問題は、HPEサーバーに固有のものではありません。</p>

<p>システムROMのこのリビジョンには、インテルマイクロコードの最新リビジョンが含まれています。これは、複雑なマイクロアーキテクチャー条件下で、X87またはAVXまたは整数除算命令を実行すると予測できないシステム動作が発生するインテルSightingを緩和します。この問題は、HPEサーバーに固有のものではありません。</p>

<p>iLOとサーバーの両方が同時にリセットされると、POST中にシステムが応答しなくなる問題に対処しました。</p>

<p>Matrox GPUが存在し、サーバーがレガシーブートモードで起動している場合、起動中にサーバーでレッドスクリーン（RSOD）が発生する可能性がある問題に対処しました。この問題は、他のオプションのPCIeグラフィックスアダプターで発生する可能性があります。この問題は断続的なものではなく、以前のシステムROMリビジョンの影響を受けるオプションのPCIeグラフィックアダプターを使用するすべてのブートで発生します。この問題は、UEFIブートモードで構成されたサーバーまたは組み込みグラフィックスコントローラーを使用している場合には見られません。</p>

<p>DIMMがシステムメモリマップにまだ存在している場合、インテグレーテッドマネージメントログ（IML）でメモリトレーニングの失敗後にDIMMがマップアウトされたことをシステムが誤って報告する可能性がある問題に対処しました。IMLはメモリトレーニングの失敗を正しく示すようになりましたが、DIMMがマップされたことを示しません。この変更は、エラーのIMLロギングにのみ影響し、システムの動作には影響しません。</p>

<p><strong>既知の問題点：</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities. The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.</p>

<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode. This problem could occur with other optional PCIe graphics adapters. This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions. This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.</p>

<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map. The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out. This change only impacts the IML logging of the error and does not impact the operation of the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigations for the multiple security vulnerabilities. The following vulnerabilities have been addressed in this System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and CVE-2019-11139. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex micro-architectural conditions, executing X87 or AVX or integer divide instructions may results in unpredictable system behavior. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where the system may become unresponsive during POST when both iLO and the server are reset simultaneously.</p>

<p>Addressed an issue where the server may experience a Red Screen (RSOD) during boot when a Matrox GPU is present and the server is booting in Legacy Boot Mode. This problem could occur with other optional PCIe graphics adapters. This issue is not intermittent and will occur on every boot with impacted optional PCIe graphics adapters with previous System ROM revisions. This issue is not seen with servers configured in UEFI Boot Mode or when using the embedded graphics controller.</p>

<p>Addressed an issue where the system may incorrectly report that a DIMM has been mapped out after a memory training failure in the Integrated Management Log (IML) when the DIMM is still present in the system memory map. The IML will now correctly indicate the memory training failure, but will not indicate that the DIMM has been mapped out. This change only impacts the IML logging of the error and does not impact the operation of the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.16_09-12-2019" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This version of the System ROM includes the latest revision of the Intel microcode which addresses an issue where the system may experience an unexpected machine check exception. This issue would be logged to the Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04  with status  0xBE000000'00800400 or  0xFE000000'00800400 Machine Check Exception. This issue is not unique to HPE servers.<p>This version of the System ROM includes the latest version of the Intel microcode which addresses an issue where under complex microarchitectural conditions involving branch instructions that span multiple 64 byte boundaries, unpredictable system behavior may occur. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This version of the System ROM includes the latest revision of the Intel microcode which addresses an issue where the system may experience an unexpected machine check exception. This issue would be logged to the Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04  with status  0xBE000000'00800400 or  0xFE000000'00800400 Machine Check Exception. This issue is not unique to HPE servers.<p>This version of the System ROM includes the latest version of the Intel microcode which addresses an issue where under complex microarchitectural conditions involving branch instructions that span multiple 64 byte boundaries, unpredictable system behavior may occur. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点:</B></P>システムROMのこのバージョンには、システムで予期しないマシンチェック例外が発生する可能性のある問題に対処するためのインテル マイクロコードの最新リビジョンが含まれています。この問題は、ステータス0xBE000000'00800400または0xFE000000'00800400マシンチェック例外を持つバンク0x03またはバンク0x04としてインテグレーテッドマネジメントログ（IML）に記録されます。この問題は、HPEサーバーに固有のものではありません。<p>このバージョンのシステムROMには、複数の64バイト境界にまたがる分岐命令を含む複雑なマイクロアーキテクチャ条件で、予測できないシステム動作が発生する可能性がある問題に対処するインテル マイクロコードの最新バージョンが含まれています。この問題は、HPEサーバーに固有のものではありません。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This version of the System ROM includes the latest revision of the Intel microcode which addresses an issue where the system may experience an unexpected machine check exception. This issue would be logged to the Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04  with status  0xBE000000'00800400 or  0xFE000000'00800400 Machine Check Exception. This issue is not unique to HPE servers.<p>This version of the System ROM includes the latest version of the Intel microcode which addresses an issue where under complex microarchitectural conditions involving branch instructions that span multiple 64 byte boundaries, unpredictable system behavior may occur. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This version of the System ROM includes the latest revision of the Intel microcode which addresses an issue where the system may experience an unexpected machine check exception. This issue would be logged to the Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04  with status  0xBE000000'00800400 or  0xFE000000'00800400 Machine Check Exception. This issue is not unique to HPE servers.<p>This version of the System ROM includes the latest version of the Intel microcode which addresses an issue where under complex microarchitectural conditions involving branch instructions that span multiple 64 byte boundaries, unpredictable system behavior may occur. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.14_09-05-2019" revision="" type_of_change="0"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,  P03055-091 and P11057-0A1) may experience an uncorrectable memory error when operating with a Second Generation Intel Xeon Scalable Processor. This issue can be seen when processor c-states are enabled on the platform. This issue does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that customers experiencing an uncorrectable memory error in one of these configurations update to this version of the System ROM before replacing any memory. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,  P03055-091 and P11057-0A1) may experience an uncorrectable memory error when operating with a Second Generation Intel Xeon Scalable Processor. This issue can be seen when processor c-states are enabled on the platform. This issue does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that customers experiencing an uncorrectable memory error in one of these configurations update to this version of the System ROM before replacing any memory. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点:</B></P>特定の2933Mhz LRDIMM（HPE製品番号P03054-091、P03055-091、およびP11057-0A1）が、第2世代インテルXeonスケーラブルプロセッサーで動作しているときに修正不可能なメモリエラーが発生する問題に対処しました。この問題は、プラットフォームでプロセッサーのc-stateが有効になっている場合に見られます。この問題は、2666Mhz LRDIMMまたはその他の速度のRDIMMには影響しません。HPEではメモリを交換する前に、これらの構成のいずれかで修正不能なメモリエラーが発生した場合、システムROMのこのバージョンにアップデートすることをお勧めします。この問題は、HPEサーバーに固有のものではありません。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,  P03055-091 and P11057-0A1) may experience an uncorrectable memory error when operating with a Second Generation Intel Xeon Scalable Processor. This issue can be seen when processor c-states are enabled on the platform. This issue does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that customers experiencing an uncorrectable memory error in one of these configurations update to this version of the System ROM before replacing any memory. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,  P03055-091 and P11057-0A1) may experience an uncorrectable memory error when operating with a Second Generation Intel Xeon Scalable Processor. This issue can be seen when processor c-states are enabled on the platform. This issue does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that customers experiencing an uncorrectable memory error in one of these configurations update to this version of the System ROM before replacing any memory. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.12_07-03-2019" revision="" type_of_change="0"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Added support for Network Choice (NC) SKUs of the HPE ProLiant DL360 Gen10 Server.  These server SKUs do not include the embedded NIC.  This revision of the System ROM supports all SKUs of the HPE ProLiant DL360 Gen10 Server, but does not include any new functionality or issue fixes for non-NC SKUs.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Added support for Network Choice (NC) SKUs of the HPE ProLiant DL360 Gen10 Server.  These server SKUs do not include the embedded NIC.  This revision of the System ROM supports all SKUs of the HPE ProLiant DL360 Gen10 Server, but does not include any new functionality or issue fixes for non-NC SKUs.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>改善点/新しい機能:</B></P>HPE ProLiant DL360 Gen10サーバーのNetwork Choice（NC）SKUのサポートを追加しました。これらのサーバーSKUには内蔵NICは含まれていません。このシステムROMのリビジョンは、HPE ProLiant DL360 Gen10サーバーのすべてのSKUをサポートしますが、新しい機能の追加やNC以外のSKUの問題の修正は含まれません。<P><B>既知の問題点:</B></P>なし]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Added support for Network Choice (NC) SKUs of the HPE ProLiant DL360 Gen10 Server.  These server SKUs do not include the embedded NIC.  This revision of the System ROM supports all SKUs of the HPE ProLiant DL360 Gen10 Server, but does not include any new functionality or issue fixes for non-NC SKUs.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Added support for Network Choice (NC) SKUs of the HPE ProLiant DL360 Gen10 Server.  These server SKUs do not include the embedded NIC.  This revision of the System ROM supports all SKUs of the HPE ProLiant DL360 Gen10 Server, but does not include any new functionality or issue fixes for non-NC SKUs.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
    </revision>
    <revision>
      <version value="2.10_05-21-2019" revision="" type_of_change="0"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for HPE Persistent Memory featuring Intel Optane DC Persistent Memory.<p>Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority Based Frequency to support enabling Intel Speed Select - Base Frequency support on select 2nd Generation Xeon Scalable Family Processors that are optimized for NFV workloads. This option, which is disabled by default, is located in the Processor Options menu and visible only when NFV optimized SKUs are installed (denoted by the N in the SKU model). On supported Operating Systems, Intel Speed Select - Based Frequency functionality allows high priority cores to operate at a higher frequency than the nominal base frequency while lower priority cores will run at a slower frequency.<p>Added a new BIOS/Platform Configuration (RBSU)  I/O Direct Cache (IODC) menu to the Power and Performance Menu. This option allows for tuning the policy for which I/O transactions interact with the processor cache. The caching policy may have a slight impact on cross socket latency. Workloads where this option would need to be modified from its default value for optimum performance are extremely rare.<p>Added support for HPE Fast Fault Tolerant  Memory (ADDDC) to operate when a single memory rank is only available on a given memory channel. Previous versions of the System ROM required two or more memory ranks to be available on each memory channel. After updating to this version of the System ROM the server will automatically configure the system for HPE Fast Fault Tolerant Memory Mode if the memory configuration supports this option.<p>Updated the UEFI OpenSSL support to version 1.0.2r to address security vulnerability CVE-2019-1559.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for HPE Persistent Memory featuring Intel Optane DC Persistent Memory.<p>Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority Based Frequency to support enabling Intel Speed Select - Base Frequency support on select 2nd Generation Xeon Scalable Family Processors that are optimized for NFV workloads. This option, which is disabled by default, is located in the Processor Options menu and visible only when NFV optimized SKUs are installed (denoted by the N in the SKU model). On supported Operating Systems, Intel Speed Select - Based Frequency functionality allows high priority cores to operate at a higher frequency than the nominal base frequency while lower priority cores will run at a slower frequency.<p>Added a new BIOS/Platform Configuration (RBSU)  I/O Direct Cache (IODC) menu to the Power and Performance Menu. This option allows for tuning the policy for which I/O transactions interact with the processor cache. The caching policy may have a slight impact on cross socket latency. Workloads where this option would need to be modified from its default value for optimum performance are extremely rare.<p>Added support for HPE Fast Fault Tolerant  Memory (ADDDC) to operate when a single memory rank is only available on a given memory channel. Previous versions of the System ROM required two or more memory ranks to be available on each memory channel. After updating to this version of the System ROM the server will automatically configure the system for HPE Fast Fault Tolerant Memory Mode if the memory configuration supports this option.<p>Updated the UEFI OpenSSL support to version 1.0.2r to address security vulnerability CVE-2019-1559.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[Intel Optane DC Persistent Memoryを搭載したHPE Persistent Memoryのサポートを追加しました。<p>NFVワークロード用に最適化された特定の第2世代Xeonスケーラブルファミリプロセッサでのインテルスピードセレクト - ベース周波数サポートの有効化をサポートするために、インテルPriority Based FrequencyをBIOS/プラットフォーム構成（RBSU）オプションに新しく追加しました。このオプションはデフォルトでは無効になっており、[プロセッサーオプション]メニューにあり、NFV最適化SKUがインストールされている場合にのみ表示されます（SKUモデルではNと表示されます）。サポートされているオペレーティングシステムでは、インテルSpeed Select-Based Frequency機能により、優先度の高いコアは公称基本周波数よりも高い周波数で動作し、優先度の低いコアは低速の周波数で動作します。<p>BIOS/プラットフォーム構成（RBSU）にI/Oダイレクトキャッシュ（IODC）メニューを電源とパフォーマンスメニューが新しく追加されました。このオプションにより、I/Oトランザクションがプロセッサーキャッシュと対話するためのポリシーを調整できます。キャッシングポリシーは、ソケット間の待ち時間にわずかな影響を与える可能性があります。最適なパフォーマンスを得るためにこのオプションをデフォルト値から変更する必要がある作業負荷は非常にまれです。<p>単一のメモリランクが特定のメモリチャネルでしか使用できない場合に動作するためのHPE高速耐故障性メモリ(ADDDC)のサポートを追加しました。以前のバージョンのシステムROMでは、各メモリチャネルで2つ以上のメモリランクを使用できる必要がありました。このバージョンのシステムROMにアップデートした後、メモリ構成がこのオプションをサポートしている場合、サーバーは自動的にシステムをHPE高速フォールトトレラントメモリモードに構成します。<p>セキュリティの脆弱性CVE-2019-1559に対処するために、UEFI OpenSSLサポートをバージョン1.0.2rに更新しました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for HPE Persistent Memory featuring Intel Optane DC Persistent Memory.<p>Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority Based Frequency to support enabling Intel Speed Select - Base Frequency support on select 2nd Generation Xeon Scalable Family Processors that are optimized for NFV workloads. This option, which is disabled by default, is located in the Processor Options menu and visible only when NFV optimized SKUs are installed (denoted by the N in the SKU model). On supported Operating Systems, Intel Speed Select - Based Frequency functionality allows high priority cores to operate at a higher frequency than the nominal base frequency while lower priority cores will run at a slower frequency.<p>Added a new BIOS/Platform Configuration (RBSU)  I/O Direct Cache (IODC) menu to the Power and Performance Menu. This option allows for tuning the policy for which I/O transactions interact with the processor cache. The caching policy may have a slight impact on cross socket latency. Workloads where this option would need to be modified from its default value for optimum performance are extremely rare.<p>Added support for HPE Fast Fault Tolerant  Memory (ADDDC) to operate when a single memory rank is only available on a given memory channel. Previous versions of the System ROM required two or more memory ranks to be available on each memory channel. After updating to this version of the System ROM the server will automatically configure the system for HPE Fast Fault Tolerant Memory Mode if the memory configuration supports this option.<p>Updated the UEFI OpenSSL support to version 1.0.2r to address security vulnerability CVE-2019-1559.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for HPE Persistent Memory featuring Intel Optane DC Persistent Memory.<p>Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority Based Frequency to support enabling Intel Speed Select - Base Frequency support on select 2nd Generation Xeon Scalable Family Processors that are optimized for NFV workloads. This option, which is disabled by default, is located in the Processor Options menu and visible only when NFV optimized SKUs are installed (denoted by the N in the SKU model). On supported Operating Systems, Intel Speed Select - Based Frequency functionality allows high priority cores to operate at a higher frequency than the nominal base frequency while lower priority cores will run at a slower frequency.<p>Added a new BIOS/Platform Configuration (RBSU)  I/O Direct Cache (IODC) menu to the Power and Performance Menu. This option allows for tuning the policy for which I/O transactions interact with the processor cache. The caching policy may have a slight impact on cross socket latency. Workloads where this option would need to be modified from its default value for optimum performance are extremely rare.<p>Added support for HPE Fast Fault Tolerant  Memory (ADDDC) to operate when a single memory rank is only available on a given memory channel. Previous versions of the System ROM required two or more memory ranks to be available on each memory channel. After updating to this version of the System ROM the server will automatically configure the system for HPE Fast Fault Tolerant Memory Mode if the memory configuration supports this option.<p>Updated the UEFI OpenSSL support to version 1.0.2r to address security vulnerability CVE-2019-1559.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Server Backup and Restore functionality may not work properly if initiated through the HPE RESTful API returning a message "An internal error occurred during RIS operation".<p>Addressed an issue where configuring memory to run at 2x refresh rate would still actually operate memory at 1x refresh rate. This issue was introduced with the v2.00 System ROM and did not impact earlier versions of the System ROM. This issue is not unique to HPE servers.<p>Addressed an issue where the NVMe PCIe Resource Padding option in BIOS/Platform Configuration (RBSU)  would not properly allocated sufficient resources to support a NVMe hot add event. In certain configurations, an insufficient amount of resources would have been reserved and a reboot would have been required to detect the presence of the newly added drive.<p>Addressed an issue where the system would not boot to a USB drive when a non-bootable (non-formatted) drive was also present in the system. This issue only impacts systems configured in Legacy Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Server Backup and Restore functionality may not work properly if initiated through the HPE RESTful API returning a message "An internal error occurred during RIS operation".<p>Addressed an issue where configuring memory to run at 2x refresh rate would still actually operate memory at 1x refresh rate. This issue was introduced with the v2.00 System ROM and did not impact earlier versions of the System ROM. This issue is not unique to HPE servers.<p>Addressed an issue where the NVMe PCIe Resource Padding option in BIOS/Platform Configuration (RBSU)  would not properly allocated sufficient resources to support a NVMe hot add event. In certain configurations, an insufficient amount of resources would have been reserved and a reboot would have been required to detect the presence of the newly added drive.<p>Addressed an issue where the system would not boot to a USB drive when a non-bootable (non-formatted) drive was also present in the system. This issue only impacts systems configured in Legacy Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点:</B></P>HPE RESTful APIを介して "RIS操作中に内部エラーが発生しました"というメッセージが返されると、サーバーのバックアップと復元機能が正しく動作しない場合があるという問題が解決されました。<p>2倍のリフレッシュレートで動作するようにメモリを設定しても、実際には1倍のリフレッシュレートでメモリが動作するという問題に対処しました。この問題はv2.00のシステムROMで発生し、以前のバージョンのシステムROMには影響しませんでした。この問題は、HPEサーバーに固有のものではありません。<p>BIOS/プラットフォーム構成（RBSU）のNVMe PCIeリソースパディングオプションが、NVMeホットアドイベントをサポートするのに十分なリソースを適切に割り当てられない問題に対処しました。特定の構成では十分な量のリソースが予約されておらず、新しく追加されたドライブの存在を検出するために再起動が必要でした。<p>起動不可能な（フォーマットされていない）ドライブもシステムに存在する場合に、システムがUSBドライブから起動しないという問題に対処しました。この問題は、レガシーブートモードで設定されたシステムにのみ影響します。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Server Backup and Restore functionality may not work properly if initiated through the HPE RESTful API returning a message "An internal error occurred during RIS operation".<p>Addressed an issue where configuring memory to run at 2x refresh rate would still actually operate memory at 1x refresh rate. This issue was introduced with the v2.00 System ROM and did not impact earlier versions of the System ROM. This issue is not unique to HPE servers.<p>Addressed an issue where the NVMe PCIe Resource Padding option in BIOS/Platform Configuration (RBSU)  would not properly allocated sufficient resources to support a NVMe hot add event. In certain configurations, an insufficient amount of resources would have been reserved and a reboot would have been required to detect the presence of the newly added drive.<p>Addressed an issue where the system would not boot to a USB drive when a non-bootable (non-formatted) drive was also present in the system. This issue only impacts systems configured in Legacy Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Server Backup and Restore functionality may not work properly if initiated through the HPE RESTful API returning a message "An internal error occurred during RIS operation".<p>Addressed an issue where configuring memory to run at 2x refresh rate would still actually operate memory at 1x refresh rate. This issue was introduced with the v2.00 System ROM and did not impact earlier versions of the System ROM. This issue is not unique to HPE servers.<p>Addressed an issue where the NVMe PCIe Resource Padding option in BIOS/Platform Configuration (RBSU)  would not properly allocated sufficient resources to support a NVMe hot add event. In certain configurations, an insufficient amount of resources would have been reserved and a reboot would have been required to detect the presence of the newly added drive.<p>Addressed an issue where the system would not boot to a USB drive when a non-bootable (non-formatted) drive was also present in the system. This issue only impacts systems configured in Legacy Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.04_04-18-2019" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience a higher rate of Uncorrectable Memory errors or boot time Memory training issues with Intel Xeon Scalable Performance Bronze and Silver processors. This issue was first introduced with System ROM version 2.00. HPE recommends that any customer experiencing a memory issue immediately update to this version of the system ROM before replacing any components. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience a higher rate of Uncorrectable Memory errors or boot time Memory training issues with Intel Xeon Scalable Performance Bronze and Silver processors. This issue was first introduced with System ROM version 2.00. HPE recommends that any customer experiencing a memory issue immediately update to this version of the system ROM before replacing any components. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点:</B></P>インテルプロセッサーのマイクロコードを最新バージョンにアップデート。<p>インテル XeonスケーラブルパフォーマンスBronzeおよびSilverプロセッサーで、システムで訂正不可能なメモリエラーまたは起動時のメモリトレーニングの問題が発生する可能性がある問題に対処しました。この問題はシステムROMバージョン2.00で最初に発生したものです。メモリに関する問題が発生しているお客様は、コンポーネントを交換する前に、このバージョンのシステムROMに直ちにアップデートすることを推奨します。この問題は、HPEサーバーに固有のものではありません。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience a higher rate of Uncorrectable Memory errors or boot time Memory training issues with Intel Xeon Scalable Performance Bronze and Silver processors. This issue was first introduced with System ROM version 2.00. HPE recommends that any customer experiencing a memory issue immediately update to this version of the system ROM before replacing any components. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience a higher rate of Uncorrectable Memory errors or boot time Memory training issues with Intel Xeon Scalable Performance Bronze and Silver processors. This issue was first introduced with System ROM version 2.00. HPE recommends that any customer experiencing a memory issue immediately update to this version of the system ROM before replacing any components. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="2.02_03-19-2019" revision="" type_of_change="1"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p>This system ROM contains the latest Intel microcode that addresses an issue where the system may experience an Uncorrected Machine Check Exception in Bank 0 with Status containing 000F0150. This update may not address all Bank 0 machine check events with a Status containing 000F0150 but should be used before any other further service actions for issues resulting in this Integrated Management Log (IML) entry. This issue is not unique to HPE servers. This issue was incorrectly documented as being addressed in the v2.00 System ROMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p>This system ROM contains the latest Intel microcode that addresses an issue where the system may experience an Uncorrected Machine Check Exception in Bank 0 with Status containing 000F0150. This update may not address all Bank 0 machine check events with a Status containing 000F0150 but should be used before any other further service actions for issues resulting in this Integrated Management Log (IML) entry. This issue is not unique to HPE servers. This issue was incorrectly documented as being addressed in the v2.00 System ROMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>このリビジョンのシステムROMには、複雑なマイクロアーキテクチャー条件下で、インテルTSX（Transactional Synchronizations Extensions）を使用するソフトウェアに予期しないシステム動作が発生する可能性があるという現在インテルが観察している問題を軽減するインテルマイクロコードの最新リビジョンが含まれています。インテルは総合テスト条件でのみこの動作を観察し、この動作を示している市販のソフトウェアを確認していません。この問題は、HPEサーバーに固有のものではありません。</p>

<p><strong>ファームウェアの依存関係:</strong></p>

<p>なし</p>

<p><strong>修正された問題点：</strong></p>

<p>このリビジョンのシステムROMには、複雑なマイクロアーキテクチャー条件下で、インテルTSX（Transactional Synchronizations Extensions）を使用するソフトウェアに予期しないシステム動作が発生する可能性があるという現在インテルが観察している問題を軽減するインテルマイクロコードの最新リビジョンが含まれています。インテルは総合テスト条件でのみこの動作を観察し、この動作を示している市販のソフトウェアを確認していません。この問題は、HPEサーバーに固有のものではありません。</p>

<p>このシステムROMには、システムが000F0150を含むステータスでバンク0に未訂正のマシンチェック例外が発生することがあるという問題に対応する最新のインテルマイクロコードが含まれています。この更新は、000F0150を含むステータスを持つバンク0のすべてのマシンチェックイベントに対処できるわけではありませんが、このインテグレーテッドマネジメントログ（IML）エントリーを発生させる問題に対する他のすべてのサービスアクションを行う前に、この更新を使用する必要があります。この問題は、HPEサーバーに固有のものではありません。この問題は、v2.00のシステムROMで対処されていると誤って記載されていました。</p>

<p><strong>既知の問題点：</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p>This system ROM contains the latest Intel microcode that addresses an issue where the system may experience an Uncorrected Machine Check Exception in Bank 0 with Status containing 000F0150. This update may not address all Bank 0 machine check events with a Status containing 000F0150 but should be used before any other further service actions for issues resulting in this Integrated Management Log (IML) entry. This issue is not unique to HPE servers. This issue was incorrectly documented as being addressed in the v2.00 System ROMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where under complex microarchitectural conditions, software using Intel TSX (Transactional Synchronizations Extensions) may result in unpredictable system behavior. Intel has only seen this under synthetic testing conditions and is not aware of any commercially available software exhibiting this behavior. This issue is not unique to HPE servers.</p>

<p>This system ROM contains the latest Intel microcode that addresses an issue where the system may experience an Uncorrected Machine Check Exception in Bank 0 with Status containing 000F0150. This update may not address all Bank 0 machine check events with a Status containing 000F0150 but should be used before any other further service actions for issues resulting in this Integrated Management Log (IML) entry. This issue is not unique to HPE servers. This issue was incorrectly documented as being addressed in the v2.00 System ROMs.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.50_12-29-2018" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM contains enhancements to the HPE memory support to improve memory resiliency. Please consult the following Customer Advisory for additional details: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Improved the memory resiliency of the server with enhanced support for HPE Fast Fault Tolerant Memory (ADDDC) capabilities.  This System ROM will now configure the Advanced Memory Protection mode of the server to HPE Fast Fault Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and Custom if the feature is supported by the server's DIMM configuration.  Note that if the Advanced Memory Protection mode had previously been configured for Mirroring or Online Spare, the setting will NOT be automatically changed to HPE Fast Fault Tolerant Memory (ADDDC) mode.  Also, if the DIMM configuration does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the Advanced Memory Protection Mode will remain Advanced ECC Mode.  Note that if the current BIOS configuration settings are queried via Redfish or the RESTful API, the setting for the Advanced Memory Protection Mode will indicate this change.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM contains enhancements to the HPE memory support to improve memory resiliency. Please consult the following Customer Advisory for additional details: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Improved the memory resiliency of the server with enhanced support for HPE Fast Fault Tolerant Memory (ADDDC) capabilities.  This System ROM will now configure the Advanced Memory Protection mode of the server to HPE Fast Fault Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and Custom if the feature is supported by the server's DIMM configuration.  Note that if the Advanced Memory Protection mode had previously been configured for Mirroring or Online Spare, the setting will NOT be automatically changed to HPE Fast Fault Tolerant Memory (ADDDC) mode.  Also, if the DIMM configuration does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the Advanced Memory Protection Mode will remain Advanced ECC Mode.  Note that if the current BIOS configuration settings are queried via Redfish or the RESTful API, the setting for the Advanced Memory Protection Mode will indicate this change.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM contains enhancements to the HPE memory support to improve memory resiliency. Please consult the following Customer Advisory for additional details: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Improved the memory resiliency of the server with enhanced support for HPE Fast Fault Tolerant Memory (ADDDC) capabilities.  This System ROM will now configure the Advanced Memory Protection mode of the server to HPE Fast Fault Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and Custom if the feature is supported by the server's DIMM configuration.  Note that if the Advanced Memory Protection mode had previously been configured for Mirroring or Online Spare, the setting will NOT be automatically changed to HPE Fast Fault Tolerant Memory (ADDDC) mode.  Also, if the DIMM configuration does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the Advanced Memory Protection Mode will remain Advanced ECC Mode.  Note that if the current BIOS configuration settings are queried via Redfish or the RESTful API, the setting for the Advanced Memory Protection Mode will indicate this change.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM contains enhancements to the HPE memory support to improve memory resiliency. Please consult the following Customer Advisory for additional details: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Improved the memory resiliency of the server with enhanced support for HPE Fast Fault Tolerant Memory (ADDDC) capabilities.  This System ROM will now configure the Advanced Memory Protection mode of the server to HPE Fast Fault Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and Custom if the feature is supported by the server's DIMM configuration.  Note that if the Advanced Memory Protection mode had previously been configured for Mirroring or Online Spare, the setting will NOT be automatically changed to HPE Fast Fault Tolerant Memory (ADDDC) mode.  Also, if the DIMM configuration does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the Advanced Memory Protection Mode will remain Advanced ECC Mode.  Note that if the current BIOS configuration settings are queried via Redfish or the RESTful API, the setting for the Advanced Memory Protection Mode will indicate this change.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM contains enhancements to the HPE memory support to improve memory resiliency. Please consult the following Customer Advisory for additional details: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>Improved the memory resiliency of the server with enhanced support for HPE Fast Fault Tolerant Memory (ADDDC) capabilities.  This System ROM will now configure the Advanced Memory Protection mode of the server to HPE Fast Fault Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and Custom if the feature is supported by the server's DIMM configuration.  Note that if the Advanced Memory Protection mode had previously been configured for Mirroring or Online Spare, the setting will NOT be automatically changed to HPE Fast Fault Tolerant Memory (ADDDC) mode.  Also, if the DIMM configuration does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the Advanced Memory Protection Mode will remain Advanced ECC Mode.  Note that if the current BIOS configuration settings are queried via Redfish or the RESTful API, the setting for the Advanced Memory Protection Mode will indicate this change.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
    </revision>
    <revision>
      <version value="1.46_10-02-2018" revision="" type_of_change="0"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for flashing the firmware of the optional HPE Trusted Platform Module (TPM).  This is the minimum revision of the System ROM that should be used if updating the firmware on the optional HPE TPM module.<p>Added a new PCIe Peer-to-Peer Serialization option to the Advanced Performance Options menu in the BIOS/Platform Configuration (RBSU). This option can be used to improve peer-to-peer performance between two PCIe devices installed on the same processor. This option may improve performance in certain GP-GPU configurations.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for flashing the firmware of the optional HPE Trusted Platform Module (TPM).  This is the minimum revision of the System ROM that should be used if updating the firmware on the optional HPE TPM module.<p>Added a new PCIe Peer-to-Peer Serialization option to the Advanced Performance Options menu in the BIOS/Platform Configuration (RBSU). This option can be used to improve peer-to-peer performance between two PCIe devices installed on the same processor. This option may improve performance in certain GP-GPU configurations.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[オプションのHPE Trusted Platform Module（TPM）のファームウェアをフラッシュする機能のサポートを追加しました。これは、オプションのHPE TPMモジュールのファームウェアを更新する場合に使用するシステムROMの最小リビジョンです。<p>BIOS/プラットフォーム構成（RBSU）のアドバンストパフォーマンスオプションメニューに新しいPCIeピアツーピア直列化オプションを追加しました。このオプションは、同一のプロセッサーにインストールされている2つのPCIeデバイス間でのピアツーピアのパフォーマンスを向上できます。このオプションにより、特定のGP GPU構成でのパフォーマンスが向上する場合があります。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for flashing the firmware of the optional HPE Trusted Platform Module (TPM).  This is the minimum revision of the System ROM that should be used if updating the firmware on the optional HPE TPM module.<p>Added a new PCIe Peer-to-Peer Serialization option to the Advanced Performance Options menu in the BIOS/Platform Configuration (RBSU). This option can be used to improve peer-to-peer performance between two PCIe devices installed on the same processor. This option may improve performance in certain GP-GPU configurations.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for flashing the firmware of the optional HPE Trusted Platform Module (TPM).  This is the minimum revision of the System ROM that should be used if updating the firmware on the optional HPE TPM module.<p>Added a new PCIe Peer-to-Peer Serialization option to the Advanced Performance Options menu in the BIOS/Platform Configuration (RBSU). This option can be used to improve peer-to-peer performance between two PCIe devices installed on the same processor. This option may improve performance in certain GP-GPU configurations.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where early server video output, on a locally attached monitor, may not show correctly when the monitor is attached to the server through a KVM. This issue does not impact systems that are not using a KVM or video output through the iLO Remote Console application.<p>Addressed an issue where firmware flashing through the RESTful API could periodically fail and the task being marked with an exception in the iLO firmware page.  This issue could impact flashing firmware such as the HPE Innovation Engine, Intel SPS Firmware or the optional HPE Trusted Platform Module (TPM).<p>Addressed an issue where a PCIe card would not properly train to its maximum speed when the PCIe Bifurcation option was enabled. This issue does not impact PCIe cards that do not require bifurcation.<p>Addressed an extremely rare issue where a system configured with an optional SATA DVD drive and an HPE SmartArray controller may become unresponsive during boot, usually with a Red Screen (RSOD), when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<p>Addressed an issue where an optional PCIe card's legacy option ROM may not properly display its legacy setup menu prompt during boot when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where early server video output, on a locally attached monitor, may not show correctly when the monitor is attached to the server through a KVM. This issue does not impact systems that are not using a KVM or video output through the iLO Remote Console application.<p>Addressed an issue where firmware flashing through the RESTful API could periodically fail and the task being marked with an exception in the iLO firmware page.  This issue could impact flashing firmware such as the HPE Innovation Engine, Intel SPS Firmware or the optional HPE Trusted Platform Module (TPM).<p>Addressed an issue where a PCIe card would not properly train to its maximum speed when the PCIe Bifurcation option was enabled. This issue does not impact PCIe cards that do not require bifurcation.<p>Addressed an extremely rare issue where a system configured with an optional SATA DVD drive and an HPE SmartArray controller may become unresponsive during boot, usually with a Red Screen (RSOD), when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<p>Addressed an issue where an optional PCIe card's legacy option ROM may not properly display its legacy setup menu prompt during boot when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点：</B></P>KVMを通じてモニターがサーバーに接続している場合に、ローカルに接続したモニターへの初期サーバービデオ出力が、正しく表示されないことがあるという問題に対処しました。この問題は、KVMを使用していないシステムや、iLOリモートコンソールアプリケーションを通じたビデオ出力には影響しません。<p>RESTful APIを通じたファームウェアのフラッシュが定期的に失敗し、iLOファームウェアページに例外とマークされるという問題に対処しました。この問題は、HPE Innovation Engine、インテルSPSファームウェア、またはオプションのHPE Trusted Platform Module（TPM）などのファームウェアのフラッシュに影響する可能性があります。<p>PCIe Bifurcationオプションを有効にしたときに、PCIeカードがその最大速度まで適切に上昇しなくなるという問題に対処しました。この問題は、分岐（Bifurcation）を必要としないPCIeカードには影響しません。<p>オプションのSATA DVDドライブとHPE Smartアレイコントローラーで構成されているシステムが、レガシーブートモードで、ブート中に応答しなくなり、通常は赤色の画面（RSOD）が表示されるという非常にまれな問題に対処しました。この問題は、UEFIブートモードのシステムには影響しません。<p>オプションのPCIeカードのレガシーオプションROMが、レガシーブートモードで起動中にレガシーのセットアップメニュープロンプトを適切に表示しないことがあるという問題に対処しました。この問題は、UEFIブートモードのシステムには影響しません。<P><B>既知の問題点：</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where early server video output, on a locally attached monitor, may not show correctly when the monitor is attached to the server through a KVM. This issue does not impact systems that are not using a KVM or video output through the iLO Remote Console application.<p>Addressed an issue where firmware flashing through the RESTful API could periodically fail and the task being marked with an exception in the iLO firmware page.  This issue could impact flashing firmware such as the HPE Innovation Engine, Intel SPS Firmware or the optional HPE Trusted Platform Module (TPM).<p>Addressed an issue where a PCIe card would not properly train to its maximum speed when the PCIe Bifurcation option was enabled. This issue does not impact PCIe cards that do not require bifurcation.<p>Addressed an extremely rare issue where a system configured with an optional SATA DVD drive and an HPE SmartArray controller may become unresponsive during boot, usually with a Red Screen (RSOD), when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<p>Addressed an issue where an optional PCIe card's legacy option ROM may not properly display its legacy setup menu prompt during boot when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where early server video output, on a locally attached monitor, may not show correctly when the monitor is attached to the server through a KVM. This issue does not impact systems that are not using a KVM or video output through the iLO Remote Console application.<p>Addressed an issue where firmware flashing through the RESTful API could periodically fail and the task being marked with an exception in the iLO firmware page.  This issue could impact flashing firmware such as the HPE Innovation Engine, Intel SPS Firmware or the optional HPE Trusted Platform Module (TPM).<p>Addressed an issue where a PCIe card would not properly train to its maximum speed when the PCIe Bifurcation option was enabled. This issue does not impact PCIe cards that do not require bifurcation.<p>Addressed an extremely rare issue where a system configured with an optional SATA DVD drive and an HPE SmartArray controller may become unresponsive during boot, usually with a Red Screen (RSOD), when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<p>Addressed an issue where an optional PCIe card's legacy option ROM may not properly display its legacy setup menu prompt during boot when in legacy boot mode. This issue does not impact systems in UEFI Boot Mode.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.42_06-20-2018" revision="" type_of_change="2"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This firmware version includes additional fixes (since version 1.40) for an issue where systems may experience a 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems may log an erroneous Bank 4 Machine Check to the iLO Integrated Management Log (IML) on a system reset event. In most cases, this error can safely be ignored. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems configured with NVDIMM-N Memory may experience a loss of persistent data during a system crash event that would cause a fatal processor error condition (IERR). This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This firmware version includes additional fixes (since version 1.40) for an issue where systems may experience a 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems may log an erroneous Bank 4 Machine Check to the iLO Integrated Management Log (IML) on a system reset event. In most cases, this error can safely be ignored. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems configured with NVDIMM-N Memory may experience a loss of persistent data during a system crash event that would cause a fatal processor error condition (IERR). This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>このリビジョンのシステムROMにはインテルのマイクロコードの最新リビジョンが含まれており、オペレーティングシステムのアップデートとの組み合わせで、Speculative Store Bypass（Variant 4とも呼ばれます）というセキュリティ上の脆弱性を緩和します。この問題には中レベルのCVEが割り当てられており、IDはCVE-2018-3639です。投機的実行機能を利用するマイクロプロセッサーを搭載し、先のすべてのメモリ書き込みのアドレスが判明する前にメモリ読み取りを投機的に実行するシステムでは、サイドチャネル解析を通じて、ローカルユーザーのアクセス権を持つ攻撃者に情報が不正に開示される可能性があります。こうしたセキュリティ上の脆弱性は、HPEサーバーに固有のものではなく、影響を受けたプロセッサーを利用するすべてのシステムに影響します。</p>

<p>このリビジョンのシステムROMにはインテルのマイクロコードの最新リビジョンが含まれており、Rogue Register Read（Variant 3aとも呼ばれます）というセキュリティ上の脆弱性を緩和します。A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. 投機的実行機能を利用するマイクロプロセッサーを搭載し、システムレジスタの投機的読み取りを行うシステムでは、サイドチャネル解析を通じて、ローカルユーザーのアクセス権を持つ攻撃者にシステムパラメーターが不正に開示される可能性があります。こうしたセキュリティ上の脆弱性は、HPEサーバーに固有のものではなく、影響を受けたプロセッサーを利用するすべてのシステムに影響します。</p>

<p><strong>ファームウェアの依存関係:</strong></p>

<p>なし</p>

<p><strong>修正された問題点：</strong></p>

<p>このリビジョンのシステムROMにはインテルのマイクロコードの最新リビジョンが含まれており、オペレーティングシステムのアップデートとの組み合わせで、Speculative Store Bypass（Variant 4とも呼ばれます）というセキュリティ上の脆弱性を緩和します。この問題には中レベルのCVEが割り当てられており、IDはCVE-2018-3639です。投機的実行機能を利用するマイクロプロセッサーを搭載し、先のすべてのメモリ書き込みのアドレスが判明する前にメモリ読み取りを投機的に実行するシステムでは、サイドチャネル解析を通じて、ローカルユーザーのアクセス権を持つ攻撃者に情報が不正に開示される可能性があります。こうしたセキュリティ上の脆弱性は、HPEサーバーに固有のものではなく、影響を受けたプロセッサーを利用するすべてのシステムに影響します。</p>

<p>このリビジョンのシステムROMにはインテルのマイクロコードの最新リビジョンが含まれており、Rogue Register Read（Variant 3aとも呼ばれます）というセキュリティ上の脆弱性を緩和します。A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. 投機的実行機能を利用するマイクロプロセッサーを搭載し、システムレジスタの投機的読み取りを行うシステムでは、サイドチャネル解析を通じて、ローカルユーザーのアクセス権を持つ攻撃者にシステムパラメーターが不正に開示される可能性があります。こうしたセキュリティ上の脆弱性は、HPEサーバーに固有のものではなく、影響を受けたプロセッサーを利用するすべてのシステムに影響します。</p>

<p>このファームウェアバージョンには、システムで、iLO Integrated Management Log（IML）に記録されている「a 389-Unexpected Shutdown and Restart」が発生することがある問題についての追加の修正（バージョン1.40以降）が含まれています。この問題は、HPEサーバーに固有のものではありません。</p>

<p>システムでシステムリセットイベントの発生時に誤ったBank 4マシンチェックがiLO Integrated Management Log（IML）に記録されることがある問題に対処しました。ほとんどの場合、このエラーは無視してもかまいません。この問題は、HPEサーバーに固有のものではありません。</p>

<p>NVDIMM-Nメモリで構成されたシステムで、致命的なプロセッサーエラー状態（IERR）の原因となるシステムクラッシュイベントの発生中に永続データが失われる可能性がある問題に対処しました。この問題は、HPEサーバーに固有のものではありません。</p>

<p><strong>既知の問題点：</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This firmware version includes additional fixes (since version 1.40) for an issue where systems may experience a 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems may log an erroneous Bank 4 Machine Check to the iLO Integrated Management Log (IML) on a system reset event. In most cases, this error can safely be ignored. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems configured with NVDIMM-N Memory may experience a loss of persistent data during a system crash event that would cause a fatal processor error condition (IERR). This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.</p>

<p>This firmware version includes additional fixes (since version 1.40) for an issue where systems may experience a 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems may log an erroneous Bank 4 Machine Check to the iLO Integrated Management Log (IML) on a system reset event. In most cases, this error can safely be ignored. This issue is not unique to HPE servers.</p>

<p>Addressed an issue where systems configured with NVDIMM-N Memory may experience a loss of persistent data during a system crash event that would cause a fatal processor error condition (IERR). This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.40_06-15-2018" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for the latest VMware vSphere Secure Boot Certificate.<p>Added support to decode certain Machine Check Exceptions to a specific failing PCIe device. Previous versions of the System ROM would log a generic Machine Check event to the Integrated Management Log (IML) for these error events.<p>Added a new BIOS/Platform Configuration (RBSU) Memory Controller Interleaving menu. This option allows disabling memory controller interleaving which may improve memory performance for systems configured with an unbalanced memory configuration.<p>Added a new BIOS/Platform Configuration (RBSU) Processor Jitter Control Optimization menu for Jitter Smoothing Support. This new optimization setting allows customers to choose between optimizing Auto-tuned mode for maximum throughput performance, low latency, or the default - zero latency.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for the latest VMware vSphere Secure Boot Certificate.<p>Added support to decode certain Machine Check Exceptions to a specific failing PCIe device. Previous versions of the System ROM would log a generic Machine Check event to the Integrated Management Log (IML) for these error events.<p>Added a new BIOS/Platform Configuration (RBSU) Memory Controller Interleaving menu. This option allows disabling memory controller interleaving which may improve memory performance for systems configured with an unbalanced memory configuration.<p>Added a new BIOS/Platform Configuration (RBSU) Processor Jitter Control Optimization menu for Jitter Smoothing Support. This new optimization setting allows customers to choose between optimizing Auto-tuned mode for maximum throughput performance, low latency, or the default - zero latency.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[最新のVMware vSphereセキュアブート証明書のサポートを追加しました。<p>特定のPCIeデバイスに障害が発生している場合に、特定のマシンチェック例外をデコードするサポートを追加しました。以前のバージョンのシステムROMでは、このようなエラーイベントが発生した場合、Integrated Management Log (IML)に汎用のマシンチェックイベントが記録されます。<p>BIOS/プラットフォーム構成（RBSU）の新しいメモリコントローラーインターリーブメニューを追加しました。このオプションでは、不均衡なメモリ構成で構成されたシステムのメモリパフォーマンスを向上させることができるメモリコントローラーインターリーブを無効にできます。<p>Jitter Smoothingに対応するために、BIOS/プラットフォーム構成（RBSU）の新しいプロセッサージッター制御最適化メニューを追加しました。この新しい最適化設定によって、自動調整モードの最適化を最大スループット、低レイテンシ、またはデフォルト（ゼロレイテンシ）から選択できます。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。<p>システムユーティリティのための言語翻訳（英語以外のモード）をアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for the latest VMware vSphere Secure Boot Certificate.<p>Added support to decode certain Machine Check Exceptions to a specific failing PCIe device. Previous versions of the System ROM would log a generic Machine Check event to the Integrated Management Log (IML) for these error events.<p>Added a new BIOS/Platform Configuration (RBSU) Memory Controller Interleaving menu. This option allows disabling memory controller interleaving which may improve memory performance for systems configured with an unbalanced memory configuration.<p>Added a new BIOS/Platform Configuration (RBSU) Processor Jitter Control Optimization menu for Jitter Smoothing Support. This new optimization setting allows customers to choose between optimizing Auto-tuned mode for maximum throughput performance, low latency, or the default - zero latency.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for the latest VMware vSphere Secure Boot Certificate.<p>Added support to decode certain Machine Check Exceptions to a specific failing PCIe device. Previous versions of the System ROM would log a generic Machine Check event to the Integrated Management Log (IML) for these error events.<p>Added a new BIOS/Platform Configuration (RBSU) Memory Controller Interleaving menu. This option allows disabling memory controller interleaving which may improve memory performance for systems configured with an unbalanced memory configuration.<p>Added a new BIOS/Platform Configuration (RBSU) Processor Jitter Control Optimization menu for Jitter Smoothing Support. This new optimization setting allows customers to choose between optimizing Auto-tuned mode for maximum throughput performance, low latency, or the default - zero latency.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where systems may experience an 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.<p>Addressed an issue where the Embedded Diagnostics may not launch properly when the UEFI POST Discovery Mode option is set to Force Fast Discovery.<p>Addressed an issue where the Integrated Management Log (IML) Viewer in the System Utilities menu may become unresponsive when launched.<p>Addressed an issue where the HPE Dual SD Card USB Module may not boot properly when the UEFI POST Discovery Mode option is set to Force Fast Discovery.<p>Addressed an issue where the Trusted Platform Module (TPM) Firmware update may not complete properly when the TPM is configured for TPM 2.0 Mode. This issue does not impact systems configured with a TPM operating in TPM 1.2 mode.<p>Addressed an issue where the system may not be able to boot to Intelligent Provisioning when a third party USB Key was installed in one of the server USB Ports.  This issue was seen with a specific USB Key and has not been seen with other devices.<p>Addressed an issue where Integrated Lights-Out (iLO) Virtual Media may not boot properly when the UEFI POST Discovery Mode option is set to Force Full Discovery.<p>Addressed an issue where the system may become unresponsive during POST or experience a Red Screen on the next boot following an I/O Machine Check Failure at runtime.<p>Addressed an issue where a system configured with the internal SD Card disabled from BIOS/Platform Configuration (RBSU) and an HPE Dual SD card installed would not boot from the HPE Dual SD card USB Module when configured in Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where a system configured with an optional HPE CN1200E-T adapter would not boot properly when configured in Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where systems configured with HPE s100i Software RAID may experience a failed RAID volume on a system reset.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where systems may experience an 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.<p>Addressed an issue where the Embedded Diagnostics may not launch properly when the UEFI POST Discovery Mode option is set to Force Fast Discovery.<p>Addressed an issue where the Integrated Management Log (IML) Viewer in the System Utilities menu may become unresponsive when launched.<p>Addressed an issue where the HPE Dual SD Card USB Module may not boot properly when the UEFI POST Discovery Mode option is set to Force Fast Discovery.<p>Addressed an issue where the Trusted Platform Module (TPM) Firmware update may not complete properly when the TPM is configured for TPM 2.0 Mode. This issue does not impact systems configured with a TPM operating in TPM 1.2 mode.<p>Addressed an issue where the system may not be able to boot to Intelligent Provisioning when a third party USB Key was installed in one of the server USB Ports.  This issue was seen with a specific USB Key and has not been seen with other devices.<p>Addressed an issue where Integrated Lights-Out (iLO) Virtual Media may not boot properly when the UEFI POST Discovery Mode option is set to Force Full Discovery.<p>Addressed an issue where the system may become unresponsive during POST or experience a Red Screen on the next boot following an I/O Machine Check Failure at runtime.<p>Addressed an issue where a system configured with the internal SD Card disabled from BIOS/Platform Configuration (RBSU) and an HPE Dual SD card installed would not boot from the HPE Dual SD card USB Module when configured in Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where a system configured with an optional HPE CN1200E-T adapter would not boot properly when configured in Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where systems configured with HPE s100i Software RAID may experience a failed RAID volume on a system reset.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点：</B></P>システムで、iLO インテグレーテッドマネジメントログ（IML）に記録されている「389-予期しないシャットダウンと再起動」が発生することがある問題に対処しました。この問題は、HPEサーバーに固有のものではありません。<p>UEFI POST検出モードオプションが高速検出の強制に設定されている場合に内蔵Diagnosticsが正しく起動しないことがある問題に対処しました。<p>システムユーティリティメニューのインテグレーテッドマネジメントログ (IML) ビューアーが起動時に応答しなくなることがある問題に対処しました。<p>UEFI POST検出モードオプションが高速検出の強制に設定されている場合にHPEデュアルSDカードUSBモジュールが正しく起動しないことがある問題に対処しました。<p>Trusted Platform Module (TPM) がTPM 2.0モード用に構成されている場合にTPMのファームウェアアップデートが正しく完了しないことがある問題に対処しました。この問題は、TPM 1.2モードで動作するTPMで構成されているシステムには影響しません。<p>サードパーティのUSBキーがサーバーのUSBポートのいずれかに取り付けられている場合にシステムでIntelligent Provisioningを起動できないことがある問題に対処しました。この問題は特定のUSBキーで検出されたものであり、他のデバイスでは検出されていません。<p>UEFI POST検出モードオプションが完全検出の強制に設定されている場合にIntegrated Lights-Out (iLO) 仮想メディアが正しく起動しないことがある問題に対処しました。<p>POST実行中にシステムが応答しなくなる、または実行時にI/Oマシンチェック障害が発生してから次の起動時にレッドスクリーンが表示される場合がある問題に対処しました。<p>レガシーブートモードで構成されている場合に、BIOS/プラットフォーム構成（RBSU）から無効にされた内蔵SDカードと、取り付けられているHPEデュアルSDカードで構成されたシステムがHPEデュアルSDカードUSBモジュールから起動しない問題に対処しました。この問題は、UEFIブートモードで構成されているシステムには影響しません。<p>レガシーブートモードで構成されている場合に、オプションのHPE CN1200E-Tアダプターで構成されたシステムが正しく起動しない問題に対処しました。この問題は、UEFIブートモードで構成されているシステムには影響しません。<p>HPE s100iソフトウェアRAIDで構成されたシステムで、システムリセット時にRAIDボリュームの障害が発生する問題を対処しました。<P><B>既知の問題点：</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where systems may experience an 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.<p>Addressed an issue where the Embedded Diagnostics may not launch properly when the UEFI POST Discovery Mode option is set to Force Fast Discovery.<p>Addressed an issue where the Integrated Management Log (IML) Viewer in the System Utilities menu may become unresponsive when launched.<p>Addressed an issue where the HPE Dual SD Card USB Module may not boot properly when the UEFI POST Discovery Mode option is set to Force Fast Discovery.<p>Addressed an issue where the Trusted Platform Module (TPM) Firmware update may not complete properly when the TPM is configured for TPM 2.0 Mode. This issue does not impact systems configured with a TPM operating in TPM 1.2 mode.<p>Addressed an issue where the system may not be able to boot to Intelligent Provisioning when a third party USB Key was installed in one of the server USB Ports.  This issue was seen with a specific USB Key and has not been seen with other devices.<p>Addressed an issue where Integrated Lights-Out (iLO) Virtual Media may not boot properly when the UEFI POST Discovery Mode option is set to Force Full Discovery.<p>Addressed an issue where the system may become unresponsive during POST or experience a Red Screen on the next boot following an I/O Machine Check Failure at runtime.<p>Addressed an issue where a system configured with the internal SD Card disabled from BIOS/Platform Configuration (RBSU) and an HPE Dual SD card installed would not boot from the HPE Dual SD card USB Module when configured in Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where a system configured with an optional HPE CN1200E-T adapter would not boot properly when configured in Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where systems configured with HPE s100i Software RAID may experience a failed RAID volume on a system reset.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where systems may experience an 389-Unexpected Shutdown and Restart, logged in the iLO Integrated Management Log (IML). This issue is not unique to HPE servers.<p>Addressed an issue where the Embedded Diagnostics may not launch properly when the UEFI POST Discovery Mode option is set to Force Fast Discovery.<p>Addressed an issue where the Integrated Management Log (IML) Viewer in the System Utilities menu may become unresponsive when launched.<p>Addressed an issue where the HPE Dual SD Card USB Module may not boot properly when the UEFI POST Discovery Mode option is set to Force Fast Discovery.<p>Addressed an issue where the Trusted Platform Module (TPM) Firmware update may not complete properly when the TPM is configured for TPM 2.0 Mode. This issue does not impact systems configured with a TPM operating in TPM 1.2 mode.<p>Addressed an issue where the system may not be able to boot to Intelligent Provisioning when a third party USB Key was installed in one of the server USB Ports.  This issue was seen with a specific USB Key and has not been seen with other devices.<p>Addressed an issue where Integrated Lights-Out (iLO) Virtual Media may not boot properly when the UEFI POST Discovery Mode option is set to Force Full Discovery.<p>Addressed an issue where the system may become unresponsive during POST or experience a Red Screen on the next boot following an I/O Machine Check Failure at runtime.<p>Addressed an issue where a system configured with the internal SD Card disabled from BIOS/Platform Configuration (RBSU) and an HPE Dual SD card installed would not boot from the HPE Dual SD card USB Module when configured in Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where a system configured with an optional HPE CN1200E-T adapter would not boot properly when configured in Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot Mode.<p>Addressed an issue where systems configured with HPE s100i Software RAID may experience a failed RAID volume on a system reset.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.36_02-14-2018" revision="" type_of_change="0"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added new Storage Information page to the System Information section of System Utilities.<p>Added a new BIOS/Platform Configuration (RBSU) Advanced PCIe Configuration option for PCIe Bifurcation of PCI Express Slots. When enabled, this option will bifurcate a PCIe slot into two equal width slots.  This option is used for certain PCIe option cards that support/require bifurcation.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance option for Direct to UPI. When Enabled, this option can provide a performance benefit in multi-processor configured systems that are reliant on the UPI bus for remote memory or I/O accesses.<p>Added a new BIOS/Platform Configuration (RBSU) Thermal Configuration option for Enhanced CPU Cooling. When running certain processor intensive workloads, this option can provide additional cooling to the processors which can result in improved performance. <p>Added a new System Utilities option for Embedded Diagnostics. To take advantage of this feature, the user must also update Intelligent Provisioning to version 3.10 or later.<p>Added support for the Integrated Lights-Out (iLO) virtual wheel mouse functionality in the BIOS System Utilities application. This feature also requires iLO firmware version 1.20 or later for proper support.<p>Added RESTful API configuration support for the HPE Smart Array S100i SR Gen10 SW RAID controller.<p>Improved performance with applications and configurations that are sensitive to PCIe Device I/O NUMA awareness.  This change optimally allocates the PCI Express I/O Proximity values in the ACPI System Locality Information Table (SLIT).<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added new Storage Information page to the System Information section of System Utilities.<p>Added a new BIOS/Platform Configuration (RBSU) Advanced PCIe Configuration option for PCIe Bifurcation of PCI Express Slots. When enabled, this option will bifurcate a PCIe slot into two equal width slots.  This option is used for certain PCIe option cards that support/require bifurcation.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance option for Direct to UPI. When Enabled, this option can provide a performance benefit in multi-processor configured systems that are reliant on the UPI bus for remote memory or I/O accesses.<p>Added a new BIOS/Platform Configuration (RBSU) Thermal Configuration option for Enhanced CPU Cooling. When running certain processor intensive workloads, this option can provide additional cooling to the processors which can result in improved performance. <p>Added a new System Utilities option for Embedded Diagnostics. To take advantage of this feature, the user must also update Intelligent Provisioning to version 3.10 or later.<p>Added support for the Integrated Lights-Out (iLO) virtual wheel mouse functionality in the BIOS System Utilities application. This feature also requires iLO firmware version 1.20 or later for proper support.<p>Added RESTful API configuration support for the HPE Smart Array S100i SR Gen10 SW RAID controller.<p>Improved performance with applications and configurations that are sensitive to PCIe Device I/O NUMA awareness.  This change optimally allocates the PCI Express I/O Proximity values in the ACPI System Locality Information Table (SLIT).<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[システムユーティリティのシステム情報セクションにストレージ情報ページが新しく追加されました。<p>BIOS/プラットフォーム構成（RBSU）に、PCI ExpressスロットのPCIe分岐のためのアドバンストPCIe構成オプションが新しく追加されました。有効にした場合、このオプションはPCIeスロットを幅の等しい2つのスロットに分岐します。このオプションは、分岐をサポートしているか必要としている、特定のPCIeオプションカードに使用します。<p>BIOS/プラットフォーム構成（RBSU）に、UPIへの送信のための電力およびパフォーマンスオプションが新しく追加されました。このオプションを有効にすると、リモートメモリまたはI/OのアクセスをUPIバスに依存しているマルチプロセッサー構成のシステムで、パフォーマンス上の利点が得られる場合があります。<p>BIOS/プラットフォーム構成（RBSU）に、強化されたCPU冷却のための温度構成オプションが新しく追加されました。プロセッサーを集中的に使用する特定のワークロードを実行するときに、このオプションはプロセッサーの冷却能力を高めることができ、パフォーマンスが向上する場合があります。<p>システムユーティリティに内蔵Diagnosticsのオプションが新しく追加されました。この機能を利用するには、Intelligent Provisioningをバージョン3.10以降にアップデートする必要もあります。<p>BIOSシステムユーティリティアプリケーションにIntegrated Lights-Out（iLO）の仮想ホイールマウス機能のサポートが追加されました。この機能を適切にサポートするには、iLOファームウェアバージョン1.20以降も必要です。<p>HPE SmartアレイS100i SR Gen10 SW RAIDコントローラーのRESTful API構成のサポートが追加されました。<p>PCIeデバイスI/OのNUMA認識に影響を受けやすいアプリケーションや構成でのパフォーマンスが改善されました。この変更により、ACPIシステム位置情報テーブル（SLIT）でPCI Express I/Oの近接値が最適に割り当てられます。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにRESTful API HPE BIOS属性レジストリリソースをアップデートしました。<p>システムユーティリティのための言語翻訳（英語以外のモード）をアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added new Storage Information page to the System Information section of System Utilities.<p>Added a new BIOS/Platform Configuration (RBSU) Advanced PCIe Configuration option for PCIe Bifurcation of PCI Express Slots. When enabled, this option will bifurcate a PCIe slot into two equal width slots.  This option is used for certain PCIe option cards that support/require bifurcation.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance option for Direct to UPI. When Enabled, this option can provide a performance benefit in multi-processor configured systems that are reliant on the UPI bus for remote memory or I/O accesses.<p>Added a new BIOS/Platform Configuration (RBSU) Thermal Configuration option for Enhanced CPU Cooling. When running certain processor intensive workloads, this option can provide additional cooling to the processors which can result in improved performance. <p>Added a new System Utilities option for Embedded Diagnostics. To take advantage of this feature, the user must also update Intelligent Provisioning to version 3.10 or later.<p>Added support for the Integrated Lights-Out (iLO) virtual wheel mouse functionality in the BIOS System Utilities application. This feature also requires iLO firmware version 1.20 or later for proper support.<p>Added RESTful API configuration support for the HPE Smart Array S100i SR Gen10 SW RAID controller.<p>Improved performance with applications and configurations that are sensitive to PCIe Device I/O NUMA awareness.  This change optimally allocates the PCI Express I/O Proximity values in the ACPI System Locality Information Table (SLIT).<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added new Storage Information page to the System Information section of System Utilities.<p>Added a new BIOS/Platform Configuration (RBSU) Advanced PCIe Configuration option for PCIe Bifurcation of PCI Express Slots. When enabled, this option will bifurcate a PCIe slot into two equal width slots.  This option is used for certain PCIe option cards that support/require bifurcation.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance option for Direct to UPI. When Enabled, this option can provide a performance benefit in multi-processor configured systems that are reliant on the UPI bus for remote memory or I/O accesses.<p>Added a new BIOS/Platform Configuration (RBSU) Thermal Configuration option for Enhanced CPU Cooling. When running certain processor intensive workloads, this option can provide additional cooling to the processors which can result in improved performance. <p>Added a new System Utilities option for Embedded Diagnostics. To take advantage of this feature, the user must also update Intelligent Provisioning to version 3.10 or later.<p>Added support for the Integrated Lights-Out (iLO) virtual wheel mouse functionality in the BIOS System Utilities application. This feature also requires iLO firmware version 1.20 or later for proper support.<p>Added RESTful API configuration support for the HPE Smart Array S100i SR Gen10 SW RAID controller.<p>Improved performance with applications and configurations that are sensitive to PCIe Device I/O NUMA awareness.  This change optimally allocates the PCI Express I/O Proximity values in the ACPI System Locality Information Table (SLIT).<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the UEFI Boot Order would not get reset to a default value when loading a default configuration. This issue does not impact systems configured in Legacy Boot Mode.</p>

<p>Addressed an issue where the High Performance Event Timer (HPET) may not function properly under an Operating System. This was typically seen under a Windows Operating System where the HPET was reported as not functioning properly in Windows Device Manager.</p>

<p>Addressed an issue where the Embedded Serial Port option could not be properly configured through the RESTful Interface.</p>

<p>Addressed an issue where the PCI Express I/O Proximity values were not properly allocated in the ACPI System Locality Information Table (SLIT). This change may help provide a performance benefit in applications and configurations that are sensitive to PCIe Device I/O NUMA awareness.</p>

<p>Addressed a rare issue where the system may become unresponsive when a SAS drive was inserted with the HPE Smart Array S100i SR Gen10 SW RAID enabled. This issue does not impact systems configured in AHCI mode.</p>

<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM. This issue does NOT occur with the Version 1.00 or Version 1.22 System ROM. Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor. If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the UEFI Boot Order would not get reset to a default value when loading a default configuration. This issue does not impact systems configured in Legacy Boot Mode.</p>

<p>Addressed an issue where the High Performance Event Timer (HPET) may not function properly under an Operating System. This was typically seen under a Windows Operating System where the HPET was reported as not functioning properly in Windows Device Manager.</p>

<p>Addressed an issue where the Embedded Serial Port option could not be properly configured through the RESTful Interface.</p>

<p>Addressed an issue where the PCI Express I/O Proximity values were not properly allocated in the ACPI System Locality Information Table (SLIT). This change may help provide a performance benefit in applications and configurations that are sensitive to PCIe Device I/O NUMA awareness.</p>

<p>Addressed a rare issue where the system may become unresponsive when a SAS drive was inserted with the HPE Smart Array S100i SR Gen10 SW RAID enabled. This issue does not impact systems configured in AHCI mode.</p>

<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM. This issue does NOT occur with the Version 1.00 or Version 1.22 System ROM. Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor. If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>重要な注意：</strong></p>

<p>なし</p>

<p><strong>ファームウェアの依存関係：</strong></p>

<p>なし</p>

<p><strong>修正された問題点：</strong></p>

<p>デフォルト構成をロードする際にUEFIブート順序がデフォルト値にリセットされない問題に対処しました。この問題は、レガシーブートモードに構成されたシステムには影響しません。</p>

<p>特定のオペレーティングシステム下でハイパフォーマンスイベントタイマー（HPET）が正しく機能しない場合があるという問題に対処しました。これは通常、WindowsデバイスマネージャーでHPETが正常に機能していないとして報告されるWindowsオペレーティングシステムで見られました。</p>

<p>RESTfulインターフェイスを通して内蔵シリアルポートのオプションを正しく構成できない問題に対処しました。</p>

<p>ACPIシステム位置情報テーブル（SLIT）でPCI Express I/Oの近接値が正しく割り当てられない問題に対処しました。この変更は、PCIeデバイスI/OのNUMA認識に影響を受けやすいアプリケーションや構成で、パフォーマンスの向上に役立つ可能性があります。</p>

<p>HPE SmartアレイS100i SR Gen10 SW RAIDが有効になっている場合にSASドライブを挿入するとシステムが反応しなくなるという、まれな問題に対処しました。この問題はAHCIモードで構成されたシステムには影響しません。</p>

<p>バージョン1.20のシステムROMを使用しているとき、iLO AdvancedライセンスがないためにCore Boostテクノロジーが無効になっている（531 -  Core Boostテクノロジーに必要なiLOライセンスがない）との誤った起動時メッセージとインテグレーテッドマネジメントログ（IML）エントリーがシステムで表示されるという問題に対処しました。この問題はバージョン1.00またはバージョン1.22のシステムROMでは発生しません。このIMLエントリーは、Intel Xeon Scalable 6143プロセッサーを使用するサーバーでのみ有効です。他のプロセッサーモデルが設置されている状態でメッセージおよびIMLエントリーが受信された場合、メッセージは誤っており、システムに悪影響を与えることなく無視できます。</p>

<p><strong>既知の問題点：</strong></p>

<p>なし</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the UEFI Boot Order would not get reset to a default value when loading a default configuration. This issue does not impact systems configured in Legacy Boot Mode.</p>

<p>Addressed an issue where the High Performance Event Timer (HPET) may not function properly under an Operating System. This was typically seen under a Windows Operating System where the HPET was reported as not functioning properly in Windows Device Manager.</p>

<p>Addressed an issue where the Embedded Serial Port option could not be properly configured through the RESTful Interface.</p>

<p>Addressed an issue where the PCI Express I/O Proximity values were not properly allocated in the ACPI System Locality Information Table (SLIT). This change may help provide a performance benefit in applications and configurations that are sensitive to PCIe Device I/O NUMA awareness.</p>

<p>Addressed a rare issue where the system may become unresponsive when a SAS drive was inserted with the HPE Smart Array S100i SR Gen10 SW RAID enabled. This issue does not impact systems configured in AHCI mode.</p>

<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM. This issue does NOT occur with the Version 1.00 or Version 1.22 System ROM. Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor. If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the UEFI Boot Order would not get reset to a default value when loading a default configuration. This issue does not impact systems configured in Legacy Boot Mode.</p>

<p>Addressed an issue where the High Performance Event Timer (HPET) may not function properly under an Operating System. This was typically seen under a Windows Operating System where the HPET was reported as not functioning properly in Windows Device Manager.</p>

<p>Addressed an issue where the Embedded Serial Port option could not be properly configured through the RESTful Interface.</p>

<p>Addressed an issue where the PCI Express I/O Proximity values were not properly allocated in the ACPI System Locality Information Table (SLIT). This change may help provide a performance benefit in applications and configurations that are sensitive to PCIe Device I/O NUMA awareness.</p>

<p>Addressed a rare issue where the system may become unresponsive when a SAS drive was inserted with the HPE Smart Array S100i SR Gen10 SW RAID enabled. This issue does not impact systems configured in AHCI mode.</p>

<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM. This issue does NOT occur with the Version 1.00 or Version 1.22 System ROM. Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor. If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.32_02-01-2018" revision="" type_of_change="2"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM addresses issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM addresses issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>このリビジョンのシステムROMにはインテルのマイクロコードの最新リビジョンが含まれており、オペレーティングシステムのアップデートとの組み合わせで、サイドチャネル解析の脆弱性のバリアント2（Spectreとも呼ばれます）を緩和します。このシステムROMに含まれているマイクロコードのリビジョンでは、Spectreバリアント2の緩和策の一部であった以前のインテルマイクロコードに影響を及ぼしていた、リブート頻度の増加および予測不能なシステム動作の問題に対処しています。<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点:</B></P>インテルプロセッサーのマイクロコードを最新バージョンにアップデート。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM addresses issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM addresses issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.28_12-11-2017" revision="" type_of_change="2"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM.  This issue does NOT occur with the Version 1.00 or Version 1.22 System ROM.  Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor.  If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM.  This issue does NOT occur with the Version 1.00 or Version 1.22 System ROM.  Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor.  If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意:</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題：</B></P>インテルプロセッサーのマイクロコードを最新バージョンにアップデート。<p>バージョン1.20のシステムROMを使用しているとき、iLO AdvancedライセンスがないためにCore Boostテクノロジーが無効になっている（531 -  Core Boostテクノロジーに必要なiLOライセンスがない）との誤った起動時メッセージとインテグレーテッドマネジメントログ（IML）エントリーがシステムで表示されるという問題に対処しました。この問題はバージョン1.00またはバージョン1.22のシステムROMでは発生しません。このIMLエントリーは、Intel Xeon Scalable 6143プロセッサーを使用するサーバーでのみ有効です。他のプロセッサーモデルが設置されている状態でメッセージおよびIMLエントリーが受信された場合、メッセージは誤っており、システムに悪影響を与えることなく無視できます。<P><B>既知の問題点:</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM.  This issue does NOT occur with the Version 1.00 or Version 1.22 System ROM.  Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor.  If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM.  This issue does NOT occur with the Version 1.00 or Version 1.22 System ROM.  Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor.  If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.26_11-14-2017" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for HPE 16GB NVDIMM-N Persistent Memory. Support for this feature also requires Innovation Firmware Version 0.1.3.2. This version of System ROM and Innovation Engine Firmware 0.1.3.2 are the minimum supported Firmware for this feature.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for HPE 16GB NVDIMM-N Persistent Memory. Support for this feature also requires Innovation Firmware Version 0.1.3.2. This version of System ROM and Innovation Engine Firmware 0.1.3.2 are the minimum supported Firmware for this feature.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[HPE 16GB NVDIMM-N 不揮発性メモリのサポートが追加されました。この機能のサポートには、Innovationファームウェアバージョン0.1.3.2も必要です。このバージョンのシステムROMとInnovation Engineファームウェア0.1.3.2は、この機能でサポートされる最小のファームウェアです。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for HPE 16GB NVDIMM-N Persistent Memory. Support for this feature also requires Innovation Firmware Version 0.1.3.2. This version of System ROM and Innovation Engine Firmware 0.1.3.2 are the minimum supported Firmware for this feature.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for HPE 16GB NVDIMM-N Persistent Memory. Support for this feature also requires Innovation Firmware Version 0.1.3.2. This version of System ROM and Innovation Engine Firmware 0.1.3.2 are the minimum supported Firmware for this feature.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM enables flash support for Innovation Engine (IE) Firmware revision 0.1.4.4 and later.  It must be installed prior to updating to IE FW 0.1.4.4.  Attempting to update to IE FW 0.1.4.4 or later without this revision of the System ROM or later will result in the flash operation not occurring.  This revision of the BIOS, along with IE FW 0.1.4.4 and SPS FW 04.00.04.288, provide a solution to mitigate security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709) with Intel’s SPS FW.  It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017.  These security vulnerabilities are not unique to HPE servers.  Note that IE FW 0.1.4.4 must be installed prior to updating to SPS FW 04.00.04.288.  <P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM enables flash support for Innovation Engine (IE) Firmware revision 0.1.4.4 and later.  It must be installed prior to updating to IE FW 0.1.4.4.  Attempting to update to IE FW 0.1.4.4 or later without this revision of the System ROM or later will result in the flash operation not occurring.  This revision of the BIOS, along with IE FW 0.1.4.4 and SPS FW 04.00.04.288, provide a solution to mitigate security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709) with Intel’s SPS FW.  It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017.  These security vulnerabilities are not unique to HPE servers.  Note that IE FW 0.1.4.4 must be installed prior to updating to SPS FW 04.00.04.288.  <p>Addressed an issue where the High Performance Event Timer (HPET) may not function properly under an Operating System. This was typically seen under a Windows Operating System where the HPET was reported as not functioning properly in Windows Device Manager.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM enables flash support for Innovation Engine (IE) Firmware revision 0.1.4.4 and later.  It must be installed prior to updating to IE FW 0.1.4.4.  Attempting to update to IE FW 0.1.4.4 or later without this revision of the System ROM or later will result in the flash operation not occurring.  This revision of the BIOS, along with IE FW 0.1.4.4 and SPS FW 04.00.04.288, provide a solution to mitigate security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709) with Intel’s SPS FW.  It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017.  These security vulnerabilities are not unique to HPE servers.  Note that IE FW 0.1.4.4 must be installed prior to updating to SPS FW 04.00.04.288.  <P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM enables flash support for Innovation Engine (IE) Firmware revision 0.1.4.4 and later.  It must be installed prior to updating to IE FW 0.1.4.4.  Attempting to update to IE FW 0.1.4.4 or later without this revision of the System ROM or later will result in the flash operation not occurring.  This revision of the BIOS, along with IE FW 0.1.4.4 and SPS FW 04.00.04.288, provide a solution to mitigate security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709) with Intel’s SPS FW.  It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017.  These security vulnerabilities are not unique to HPE servers.  Note that IE FW 0.1.4.4 must be installed prior to updating to SPS FW 04.00.04.288.  <p>Addressed an issue where the High Performance Event Timer (HPET) may not function properly under an Operating System. This was typically seen under a Windows Operating System where the HPET was reported as not functioning properly in Windows Device Manager.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>システムROMのこのリビジョンは、Innovation Engine（IE）ファームウェアリビジョン0.1.4.4以降のフラッシュサポートを有効にします。これは、IE FW 0.1.4.4にアップデートする前にインストールする必要があります。システムROMのこのリビジョン以降を使用せずにIE FW 0.1.4.4以降にアップデートしようとすると、フラッシュ動作が実行されません。このBIOSのリビジョンと、IE FW 0.1.4.4およびSPS FW 04.00.04.288は、IntelのSPS FWに関するセキュリティ脆弱性CVE-2017-5706（http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706）およびCVE-2017-5709（http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709）を緩和する解決方法を提供します。これらのセキュリティ脆弱性についての詳細は、2017年11月20日にこれらのリンクに公開予定です。これらのセキュリティ脆弱性は、HPEサーバーに固有のものではありません。SPS FW 04.00.04.288にアップデートする前に、IE FW 0.1.4.4をインストールする必要があることに注意してください。<P><B>ファームウェアの依存関係：</B></P>なし<P><B>修正された問題点：</B></P>システムROMのこのリビジョンは、Innovation Engine（IE）ファームウェアリビジョン0.1.4.4以降のフラッシュサポートを有効にします。これは、IE FW 0.1.4.4にアップデートする前にインストールする必要があります。システムROMのこのリビジョン以降を使用せずにIE FW 0.1.4.4以降にアップデートしようとすると、フラッシュ動作が実行されません。このBIOSのリビジョンと、IE FW 0.1.4.4およびSPS FW 04.00.04.288は、IntelのSPS FWに関するセキュリティ脆弱性CVE-2017-5706（http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706）およびCVE-2017-5709（http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709）を緩和する解決方法を提供します。これらのセキュリティ脆弱性についての詳細は、2017年11月20日にこれらのリンクに公開予定です。これらのセキュリティ脆弱性は、HPEサーバーに固有のものではありません。SPS FW 04.00.04.288にアップデートする前に、IE FW 0.1.4.4をインストールする必要があることに注意してください。<p>特定のオペレーティングシステム下でハイパフォーマンスイベントタイマー（HPET）が正しく機能しない場合があるという問題に対処しました。これは通常、WindowsデバイスマネージャーでHPETが正常に機能していないとして報告されるWindowsオペレーティングシステムで見られました。<P><B>既知の問題点：</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM enables flash support for Innovation Engine (IE) Firmware revision 0.1.4.4 and later.  It must be installed prior to updating to IE FW 0.1.4.4.  Attempting to update to IE FW 0.1.4.4 or later without this revision of the System ROM or later will result in the flash operation not occurring.  This revision of the BIOS, along with IE FW 0.1.4.4 and SPS FW 04.00.04.288, provide a solution to mitigate security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709) with Intel’s SPS FW.  It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017.  These security vulnerabilities are not unique to HPE servers.  Note that IE FW 0.1.4.4 must be installed prior to updating to SPS FW 04.00.04.288.  <P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM enables flash support for Innovation Engine (IE) Firmware revision 0.1.4.4 and later.  It must be installed prior to updating to IE FW 0.1.4.4.  Attempting to update to IE FW 0.1.4.4 or later without this revision of the System ROM or later will result in the flash operation not occurring.  This revision of the BIOS, along with IE FW 0.1.4.4 and SPS FW 04.00.04.288, provide a solution to mitigate security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709) with Intel’s SPS FW.  It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017.  These security vulnerabilities are not unique to HPE servers.  Note that IE FW 0.1.4.4 must be installed prior to updating to SPS FW 04.00.04.288.  <p>Addressed an issue where the High Performance Event Timer (HPET) may not function properly under an Operating System. This was typically seen under a Windows Operating System where the HPET was reported as not functioning properly in Windows Device Manager.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>This revision of the System ROM enables flash support for Innovation Engine (IE) Firmware revision 0.1.4.4 and later.  It must be installed prior to updating to IE FW 0.1.4.4.  Attempting to update to IE FW 0.1.4.4 or later without this revision of the System ROM or later will result in the flash operation not occurring.  This revision of the BIOS, along with IE FW 0.1.4.4 and SPS FW 04.00.04.288, provide a solution to mitigate security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709) with Intel’s SPS FW.  It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017.  These security vulnerabilities are not unique to HPE servers.  Note that IE FW 0.1.4.4 must be installed prior to updating to SPS FW 04.00.04.288.  <P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM enables flash support for Innovation Engine (IE) Firmware revision 0.1.4.4 and later.  It must be installed prior to updating to IE FW 0.1.4.4.  Attempting to update to IE FW 0.1.4.4 or later without this revision of the System ROM or later will result in the flash operation not occurring.  This revision of the BIOS, along with IE FW 0.1.4.4 and SPS FW 04.00.04.288, provide a solution to mitigate security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709) with Intel’s SPS FW.  It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017.  These security vulnerabilities are not unique to HPE servers.  Note that IE FW 0.1.4.4 must be installed prior to updating to SPS FW 04.00.04.288.  <p>Addressed an issue where the High Performance Event Timer (HPET) may not function properly under an Operating System. This was typically seen under a Windows Operating System where the HPET was reported as not functioning properly in Windows Device Manager.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.22_09-29-2017" revision="" type_of_change="0"/>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the system would not achieve maximum performance results when the BIOS/Platform Configuration (RBSU) Sub-NUMA Clustering option is enabled.  This option is not enabled by default.<p>Addressed an issue where the system may have the system time incorrectly "shifted" to the incorrect time after the operating system has been running for an extended period of time. This issue was typically seen under Microsoft Windows when the Set Time Automatically option was enabled from the Windows Date and Time Settings configuration page.<p>Addressed an issue where the system may report an inaccurate error message in the Integrated Management Log (IML) when a memory training failure occurred. It is recommended that customers update to this version of the system ROM before replacing any DIMMs due to a training issue.<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM.  This issue does NOT occur with the Version 1.00 System ROM.  Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor.  If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the system would not achieve maximum performance results when the BIOS/Platform Configuration (RBSU) Sub-NUMA Clustering option is enabled.  This option is not enabled by default.<p>Addressed an issue where the system may have the system time incorrectly "shifted" to the incorrect time after the operating system has been running for an extended period of time. This issue was typically seen under Microsoft Windows when the Set Time Automatically option was enabled from the Windows Date and Time Settings configuration page.<p>Addressed an issue where the system may report an inaccurate error message in the Integrated Management Log (IML) when a memory training failure occurred. It is recommended that customers update to this version of the system ROM before replacing any DIMMs due to a training issue.<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM.  This issue does NOT occur with the Version 1.00 System ROM.  Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor.  If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>なし<P><B>ファームウェアの依存関係:</B></P>なし<P><B>修正された問題点：</B></P>BIOS/プラットフォーム構成（RBSU）Sub-NUMAクラスタリングオプションが有効になっているときにシステムが最大のパフォーマンス結果を達成しない問題に対処しました。このオプションは、デフォルトで無効になっています。<p>オペレーティングシステムが長時間実行された後に、システムが誤ってシステム時刻を間違った時刻に"シフト"してしまう問題に対処しました。この問題はMicrosoft Windowsで、Windowsの日付と時刻の設定ページで時刻を自動的に設定するオプションが有効になっている場合に通常発生します。<p>メモリトレーニングの失敗が発生したときにシステムがインテグレーテッドマネジメントログ（IML）で不正確なエラーメッセージを報告するという問題に対処しました。トレーニングに問題が起こっているユーザーは、DIMMを置き換える前に、このバージョンのシステムROMにアップデートすることを推奨します。<p>バージョン1.20のシステムROMを使用しているとき、iLO AdvancedライセンスがないためにCore Boostテクノロジーが無効になっている（531 -  Core Boostテクノロジーに必要なiLOライセンスがない）との誤った起動時メッセージとインテグレーテッドマネジメントログ（IML）エントリーがシステムで表示されるという問題に対処しました。この問題はバージョン1.00のシステムROMでは発生しません。このIMLエントリーは、Intel Xeon Scalable 6143プロセッサーを使用するサーバーでのみ有効です。他のプロセッサーモデルが設置されている状態でメッセージおよびIMLエントリーが受信された場合、メッセージは誤っており、システムに悪影響を与えることなく無視できます。<P><B>既知の問題点：</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the system would not achieve maximum performance results when the BIOS/Platform Configuration (RBSU) Sub-NUMA Clustering option is enabled.  This option is not enabled by default.<p>Addressed an issue where the system may have the system time incorrectly "shifted" to the incorrect time after the operating system has been running for an extended period of time. This issue was typically seen under Microsoft Windows when the Set Time Automatically option was enabled from the Windows Date and Time Settings configuration page.<p>Addressed an issue where the system may report an inaccurate error message in the Integrated Management Log (IML) when a memory training failure occurred. It is recommended that customers update to this version of the system ROM before replacing any DIMMs due to a training issue.<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM.  This issue does NOT occur with the Version 1.00 System ROM.  Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor.  If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the system would not achieve maximum performance results when the BIOS/Platform Configuration (RBSU) Sub-NUMA Clustering option is enabled.  This option is not enabled by default.<p>Addressed an issue where the system may have the system time incorrectly "shifted" to the incorrect time after the operating system has been running for an extended period of time. This issue was typically seen under Microsoft Windows when the Set Time Automatically option was enabled from the Windows Date and Time Settings configuration page.<p>Addressed an issue where the system may report an inaccurate error message in the Integrated Management Log (IML) when a memory training failure occurred. It is recommended that customers update to this version of the system ROM before replacing any DIMMs due to a training issue.<p>Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM.  This issue does NOT occur with the Version 1.00 System ROM.  Note that this IML entry is only valid for servers using the Intel Xeon Scalable 6143 processor.  If the message and IML entry are received with any other processor model installed, the message is erroneous and can be ignored without any negative impact to the system.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.20_08-18-2017" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for Dynamic Power Capping. This feature can be enabled from the BIOS/Platform Configuration (RBSU) Boot Time Optimizations Menu. For proper operation, please ensure that Power Management Controller Firmware version 1.0.4 and Integrated Lights-Out (iLO) Firmware version 1.15 are updated on the server.<p>Added support for the HPE Core Boost Technology. This feature also require HPE Innovation Engine Firmware 1.2.4 to be updated on the system to properly function.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance Tuning option for LLC Dead Line Allocation. When running certain applications, it may be necessary to change this parameter for optimal system performance.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance Tuning option for Stale A to S. When running certain applications, it may be necessary to change this parameter for optimal system performance.<p>Added support to detect and report unbalanced memory configurations that may result in non-optimal performance. Please consult the Memory Population Guidelines for more information on memory population rules and recommendations.<p>Added a new Auto option for the XPT Prefetcher in the BIOS/Platform Configuration (RBSU) menu that will default the XPT prefetched to disabled based on a current Intel sighting. It is recommended that users leave this setting in Auto mode and do not Force Enable the option due to potential stability issues.<p>Added support for HPE 128GB SmartMemory Load Reduced DIMMs (LRDIMMs).<p>Updated the system thermal logic to support the latest adapters.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for Dynamic Power Capping. This feature can be enabled from the BIOS/Platform Configuration (RBSU) Boot Time Optimizations Menu. For proper operation, please ensure that Power Management Controller Firmware version 1.0.4 and Integrated Lights-Out (iLO) Firmware version 1.15 are updated on the server.<p>Added support for the HPE Core Boost Technology. This feature also require HPE Innovation Engine Firmware 1.2.4 to be updated on the system to properly function.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance Tuning option for LLC Dead Line Allocation. When running certain applications, it may be necessary to change this parameter for optimal system performance.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance Tuning option for Stale A to S. When running certain applications, it may be necessary to change this parameter for optimal system performance.<p>Added support to detect and report unbalanced memory configurations that may result in non-optimal performance. Please consult the Memory Population Guidelines for more information on memory population rules and recommendations.<p>Added a new Auto option for the XPT Prefetcher in the BIOS/Platform Configuration (RBSU) menu that will default the XPT prefetched to disabled based on a current Intel sighting. It is recommended that users leave this setting in Auto mode and do not Force Enable the option due to potential stability issues.<p>Added support for HPE 128GB SmartMemory Load Reduced DIMMs (LRDIMMs).<p>Updated the system thermal logic to support the latest adapters.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[動的消費電力上限のサポートの追加 この機能は、BIOS/プラットフォーム構成（RBSU）ブート時間最適化メニューから有効にできます。適切に動作するために、Power Management Controller Firmwareのバージョン1.0.4およびIntegrated Lights-Out（iLO）ファームウェアバージョン1.15がサーバー上で更新されていることを確認してください。<p>HPE Core Boostテクノロジーのサポートを追加しました。正しく機能するには、HPE Innovation Engine Firmware 1.2.4をシステム上でアップデートすることも必要です。<p>LLCデッドライン割り当てのためのBIOS/プラットフォーム構成（RBSU）の電力およびパフォーマンスチューニングのオプションが新しく追加されました。特定のアプリケーションを実行する場合は、システムパフォーマンスを最適にするためにこのパラメーターを変更することが必要な場合があります。<p>古くなったAからSに対応する新しいBIOS/プラットフォーム構成（RBSU）の電力およびパフォーマンスチューニングオプションを追加しました。特定のアプリケーションを実行する場合は、システムパフォーマンスを最適にするためにこのパラメーターを変更することが必要な場合があります。<p>パフォーマンスが最適でなくなることがある不均衡なメモリ構成を検出して報告するためのサポートが追加されました。メモリ取り付け規則と推奨事項について詳しくは、メモリ取り付けガイドラインを参照してください。<p>現在のIntelの観察に基づいて、XPTプリフェッチをデフォルトで無効に設定するXPTプリフェッチャ用の新しい自動オプションがBIOS/プラットフォーム構成（RBSU）メニューに追加されました。ユーザーはこの設定を自動モードのままにすることを推奨します。電位安定性に問題があるため、このオプションを強制的に有効にしないでください。<p>HPE128GB SmartメモリLoad Reduced DIMM (LRDIMM)のサポートを追加しました。<p>最新のアダプターをサポートするためにシステムのサーマルロジックを修正しました。<p>最新のBIOS/プラットフォーム構成オプションと一致するようにHPE RESTful API HPE BIOS属性レジストリリソースをアップデートしました。<p>システムユーティリティのための言語翻訳（英語以外のモード）をアップデートしました。]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for Dynamic Power Capping. This feature can be enabled from the BIOS/Platform Configuration (RBSU) Boot Time Optimizations Menu. For proper operation, please ensure that Power Management Controller Firmware version 1.0.4 and Integrated Lights-Out (iLO) Firmware version 1.15 are updated on the server.<p>Added support for the HPE Core Boost Technology. This feature also require HPE Innovation Engine Firmware 1.2.4 to be updated on the system to properly function.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance Tuning option for LLC Dead Line Allocation. When running certain applications, it may be necessary to change this parameter for optimal system performance.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance Tuning option for Stale A to S. When running certain applications, it may be necessary to change this parameter for optimal system performance.<p>Added support to detect and report unbalanced memory configurations that may result in non-optimal performance. Please consult the Memory Population Guidelines for more information on memory population rules and recommendations.<p>Added a new Auto option for the XPT Prefetcher in the BIOS/Platform Configuration (RBSU) menu that will default the XPT prefetched to disabled based on a current Intel sighting. It is recommended that users leave this setting in Auto mode and do not Force Enable the option due to potential stability issues.<p>Added support for HPE 128GB SmartMemory Load Reduced DIMMs (LRDIMMs).<p>Updated the system thermal logic to support the latest adapters.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[Added support for Dynamic Power Capping. This feature can be enabled from the BIOS/Platform Configuration (RBSU) Boot Time Optimizations Menu. For proper operation, please ensure that Power Management Controller Firmware version 1.0.4 and Integrated Lights-Out (iLO) Firmware version 1.15 are updated on the server.<p>Added support for the HPE Core Boost Technology. This feature also require HPE Innovation Engine Firmware 1.2.4 to be updated on the system to properly function.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance Tuning option for LLC Dead Line Allocation. When running certain applications, it may be necessary to change this parameter for optimal system performance.<p>Added a new BIOS/Platform Configuration (RBSU) Power and Performance Tuning option for Stale A to S. When running certain applications, it may be necessary to change this parameter for optimal system performance.<p>Added support to detect and report unbalanced memory configurations that may result in non-optimal performance. Please consult the Memory Population Guidelines for more information on memory population rules and recommendations.<p>Added a new Auto option for the XPT Prefetcher in the BIOS/Platform Configuration (RBSU) menu that will default the XPT prefetched to disabled based on a current Intel sighting. It is recommended that users leave this setting in Auto mode and do not Force Enable the option due to potential stability issues.<p>Added support for HPE 128GB SmartMemory Load Reduced DIMMs (LRDIMMs).<p>Updated the system thermal logic to support the latest adapters.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.<p>Updated the language translations (non-English modes) for System Utilities.]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_fixes_xlate lang="en">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Embedded UEFI Shell restclient utility would not properly configure attributes for Network TLS (HTTPS) support.<p>Addressed an issue where the UEFI or Legacy Boot Order could still be modified after an incorrect Administrator Password was entered in the BIOS/Platform Configuration (RBSU) menus.<p>Addressed an issue where the embedded AHCI SATA controller would not show up properly in the BIOS/Platform Configuration (RBSU) PCI Devices menu when no drives were attached to the controller.<p>Addressed an issue where the chassis power supply information would not be properly reported from the Industry Standard SMBIOS records.<p>Addressed an issue where saving a setting from an Optional Devices configuration page, such as a Network Adapter, in the System Utilities menu would not be saved properly.<p>Addressed an issue where the system ROM would not correctly report a configurations error for the HPE Smart Battery storage subsystem when more devices were installed than could be supported by the installed battery.<p>Addressed an issue where a platform configured with direct attached NVMe hard drives may report the incorrect location (box and bay location) from the System Utilities page.<p>Addressed an issue where the System Utilities menu may not show the proper name for an optional PCIe Adapter.<p>Addressed an issue where the SMBIOS Type 3 record for chassis information may not properly report the chassis serial number.<p>Addressed an issue where the Integrated Lights Out (iLO) remote Console Keyboard and Mouse may not function properly when the system is configured for Legacy Boot Mode. This issue does not exist on systems configured in UEFI Boot Mode.<p>Addressed an issue where the chassis firmware revision would not be reported properly from the System Information page or Integrated Lights Out (iLO) web interface.<p>Addressed an issue where the HPE Jitter Performance feature settings could not be properly modified from the Integrated Lights Out web interface.<p>Addressed an issue where the system may report that the HPE Smart Battery is charging when in fact the battery has failed. It is recommended to flash to this system ROM if a system is reporting Smart Battery issues.<p>Addressed an issue where the Trusted Platform Module (TPM) option for TPM Visibility could not be configured through the RESTful API.<p>Addressed an issue where the system may become unresponsive when repeatedly typing characters, such as DIR, in Legacy Boot Mode from a pre-OS environment.  This issue does not impact systems in UEFI Boot Mode or a system once the system boots into an operating system.<p>Addressed an issue where certain third party PCIe adapters, such as a Dialogic adapter, would not function properly due to the PCIe Maximum Payload size being incorrectly programmed.<p>Addressed an issue where certain NVMe devices may not be detected when the x16 slot PCIe Riser and three slot x8 riser are present in the server.<p>Addressed an issue where a Network Boot option would still show an entry  in the Legacy Boot Order when Network Boot was disabled on the device from the BIOS/Platform Configuration (RBSU) Network Options Menu. This issue does not affect systems configured for UEFI Boot Mode.<p>Addressed an issue where the system may become unresponsive when using the TAB key in the BIOS/Platform Configuration (RBSU) menus.<p>Addressed an issue where the BIOS would not properly identify and halt a system from booting with an invalid DIMM configuration.<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) Energy Efficient Turbo setting was backwards.<p>Addressed an issue where the server might lockup and display a red screen when trying to repair a failed RAID volume off of a S100i SW RAID controller.<p>Addressed an issue where the server might become unresponsive during boot when trying to repair a failed RAID volume off of a S100i SW RAID controller.<p>Addressed an issue where the RESTful API may report that BIOS settings were not applied properly even when they are properly configured.<p>Addressed an issue where the system may become unresponsive during boot after a warm reset, typically seen with a blank screen, when a Trusted Platform Module (TPM) is installed.<p>Addressed an extremely rare issue where the system may incorrectly report a 413 Innovation Engine Authentication Error on a server reboot.<p>Removed support for the BIOS/Platform Configuration (RBSU) Power On Logo disable functionality.<p>Removed the Platform Configuration (RBSU) Option to enable or disable the Embedded Diagnostics.  Embedded Diagnostics is not supported on this server and the menu option should not have been available and was not functional.<p>Removed support for the Chipset based Firmware Trusted Platform Module (Intel PTT). This feature is no longer support due to stability issues. Users should instead install a discrete HPE TPM option for this support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="cn">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Embedded UEFI Shell restclient utility would not properly configure attributes for Network TLS (HTTPS) support.<p>Addressed an issue where the UEFI or Legacy Boot Order could still be modified after an incorrect Administrator Password was entered in the BIOS/Platform Configuration (RBSU) menus.<p>Addressed an issue where the embedded AHCI SATA controller would not show up properly in the BIOS/Platform Configuration (RBSU) PCI Devices menu when no drives were attached to the controller.<p>Addressed an issue where the chassis power supply information would not be properly reported from the Industry Standard SMBIOS records.<p>Addressed an issue where saving a setting from an Optional Devices configuration page, such as a Network Adapter, in the System Utilities menu would not be saved properly.<p>Addressed an issue where the system ROM would not correctly report a configurations error for the HPE Smart Battery storage subsystem when more devices were installed than could be supported by the installed battery.<p>Addressed an issue where a platform configured with direct attached NVMe hard drives may report the incorrect location (box and bay location) from the System Utilities page.<p>Addressed an issue where the System Utilities menu may not show the proper name for an optional PCIe Adapter.<p>Addressed an issue where the SMBIOS Type 3 record for chassis information may not properly report the chassis serial number.<p>Addressed an issue where the Integrated Lights Out (iLO) remote Console Keyboard and Mouse may not function properly when the system is configured for Legacy Boot Mode. This issue does not exist on systems configured in UEFI Boot Mode.<p>Addressed an issue where the chassis firmware revision would not be reported properly from the System Information page or Integrated Lights Out (iLO) web interface.<p>Addressed an issue where the HPE Jitter Performance feature settings could not be properly modified from the Integrated Lights Out web interface.<p>Addressed an issue where the system may report that the HPE Smart Battery is charging when in fact the battery has failed. It is recommended to flash to this system ROM if a system is reporting Smart Battery issues.<p>Addressed an issue where the Trusted Platform Module (TPM) option for TPM Visibility could not be configured through the RESTful API.<p>Addressed an issue where the system may become unresponsive when repeatedly typing characters, such as DIR, in Legacy Boot Mode from a pre-OS environment.  This issue does not impact systems in UEFI Boot Mode or a system once the system boots into an operating system.<p>Addressed an issue where certain third party PCIe adapters, such as a Dialogic adapter, would not function properly due to the PCIe Maximum Payload size being incorrectly programmed.<p>Addressed an issue where certain NVMe devices may not be detected when the x16 slot PCIe Riser and three slot x8 riser are present in the server.<p>Addressed an issue where a Network Boot option would still show an entry  in the Legacy Boot Order when Network Boot was disabled on the device from the BIOS/Platform Configuration (RBSU) Network Options Menu. This issue does not affect systems configured for UEFI Boot Mode.<p>Addressed an issue where the system may become unresponsive when using the TAB key in the BIOS/Platform Configuration (RBSU) menus.<p>Addressed an issue where the BIOS would not properly identify and halt a system from booting with an invalid DIMM configuration.<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) Energy Efficient Turbo setting was backwards.<p>Addressed an issue where the server might lockup and display a red screen when trying to repair a failed RAID volume off of a S100i SW RAID controller.<p>Addressed an issue where the server might become unresponsive during boot when trying to repair a failed RAID volume off of a S100i SW RAID controller.<p>Addressed an issue where the RESTful API may report that BIOS settings were not applied properly even when they are properly configured.<p>Addressed an issue where the system may become unresponsive during boot after a warm reset, typically seen with a blank screen, when a Trusted Platform Module (TPM) is installed.<p>Addressed an extremely rare issue where the system may incorrectly report a 413 Innovation Engine Authentication Error on a server reboot.<p>Removed support for the BIOS/Platform Configuration (RBSU) Power On Logo disable functionality.<p>Removed the Platform Configuration (RBSU) Option to enable or disable the Embedded Diagnostics.  Embedded Diagnostics is not supported on this server and the menu option should not have been available and was not functional.<p>Removed support for the Chipset based Firmware Trusted Platform Module (Intel PTT). This feature is no longer support due to stability issues. Users should instead install a discrete HPE TPM option for this support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ja">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>なし<P><B>ファームウェアの依存関係：</B></P>なし<P><B>修正された問題点：</B></P>内蔵UEFIシェルrestclientユーティリティがネットワーク TLS（HTTPS）サポートの属性を適切に構成しないという問題に対処しました。<p>BIOS/プラットフォーム構成（RBSU）メニューに誤った管理者パスワードが入力された後もUEFIまたはレガシーブート順序が変更されるという問題に対処しました。<p>ドライブがコントローラーに接続されていないときに組み込みAHCI SATAコントローラーがBIOS/プラットフォーム構成（RBSU）PCIデバイスメニューに正しく表示されないという問題に対処しました。<p>シャーシの電源装置情報が業界標準SMBIOSレコードから適切に報告されないという問題に対処しました。<p>システムユーティリティメニューで、ネットワークアダプターなどのオプションデバイス構成ページからの設定の保存が正しく保存されないという問題に対処しました。<p>取り付けられているバッテリによってサポートできるよりも多くのデバイスが取り付けられている場合、システムROMはHPE Smartバッテリストレージサブシステムの構成エラーを正しく報告しないという問題に対処しました。<p>直接接続されたNVMeハードディスクドライブで構成されたプラットフォームがシステムユーティリティページから正しくない場所（ボックスおよびベイの場所）を報告するという問題に対処しました。<p>システムユーティリティメニューでオプションのPCIeアダプターの正しい名前が表示されないという問題に対処しました。<p>シャーシ情報のためのSMBIOS タイプ3レコードがシャーシのシリアル番号を正しく報告しないという問題に対処しました。<p>システムがレガシーブートモードで構成された場合にIntegrated Lights Out（iLO）リモートコンソールキーボードとマウスが正しく機能しないという問題に対処しました。この問題は、UEFIブートモードに構成されたシステムには存在しません。<p>シャーシのファームウェアリビジョンが、システム情報ページまたはIntegrated Lights Out（iLO）Webインターフェイスから正しく報告されないという問題に対処しました。<p>HPEジッターパフォーマンス機能の設定をIntegrated Lights Out Webインターフェイスから正しく変更できないという問題に対処しました。<p>バッテリが実際には故障しているときにHPE Smartバッテリが充電中だとシステムから報告される問題に対処しました。システムがSmartバッテリの問題点を報告している場合、このシステムROMをフラッシュすることをお勧めします。<p>Trustetd Platform Module（TPM）ビジビリティのTPMオプションがRESTful APIを通じて構成できないという問題に対処しました。<p>OS起動前環境からレガシーブートモードでDIRなどの文字を繰り返し入力するとシステムが反応しなくなるという問題に対処しました。この問題は、UEFIブートモードのシステムまたはオペレーティングシステムを起動したシステムには影響しません 。<p>PCIe最大ペイロードサイズが正しくプログラムされていないという理由で、Dialogicアダプターなどの特定のサードパーティPCIeアダプターが正しく機能しないという問題に対処しました。<p>x16スロットPCIeライザーおよび3スロットx8ライザーがサーバー内に存在するとき、特定のNVMeデバイスが検出されないという問題に対処しました。<p>BIOS/プラットフォーム構成（RBSU）ネットワークオプションメニューからデバイス上のネットワークブートが無効にされたとき、ネットワークブートオプションが依然としてレガシーブート順序内にエントリを表示するという問題に対処しました。この問題は、UEFIブートモードに構成されたシステムには影響しません。<p>BIOS/プラットフォーム構成（RBSU）メニューでTABキーを使用する場合にシステムが反応しなくなるという問題に対処しました。<p>DIMM構成が無効な場合にBIOSが正しく識別せずシステムを停止するという問題に対処しました。<p>BIOS/プラットフォーム構成（RBSU）エネルギー効率ターボ設定が退行しているという問題を処理しました。<p>S100i SW RAIDコントローラーから故障したRAIDボリュームを修理しようとすると、サーバーがロックアップして赤色の画面が表示されるという問題に対処しました。<p>S100i SW RAIDコントローラーから故障したRAIDボリュームを修理しようとすると、サーバーがブート中に応答しなくなるという問題に対処しました。<p>BIOSが正しく構成されていても、RESTful APIでBIOS設定が正しく適用されていないと報告されるという問題に対処しました。<p>Trusted Platform Module（TPM）がインストールされているとき、システムがウォームリセット後のブート中に反応しなくなり、通常はブランク画面が表示されるという問題に対処しました。<p>サーバーの再起動時にシステムが413 Innovation Engine認証エラーを誤って報告するという非常にまれに生じる問題に対処しました。<p>BIOS/プラットフォーム構成（RBSU）の電源オンロゴの無効化機能のサポートを無効にしました。<p>Embedded Diagnosticsを有効または無効にするプラットフォーム構成 (RBSU) オプションを削除しました。Embedded Diagnosticsはこのサーバーでサポートされていないのでメニューオプションは必要なく、機能がしません。<p>チップセットベースのファームウェアTrusted Platform Module（Intel PTT）のサポートが削除されました。この機能は安定性の問題のためサポートされなくなりました。これをサポートするには、ユーザーは個別のHPE TPMオプションを代わりにインストールする必要があります。<P><B>既知の問題点：</B></P>なし]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="ko">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Embedded UEFI Shell restclient utility would not properly configure attributes for Network TLS (HTTPS) support.<p>Addressed an issue where the UEFI or Legacy Boot Order could still be modified after an incorrect Administrator Password was entered in the BIOS/Platform Configuration (RBSU) menus.<p>Addressed an issue where the embedded AHCI SATA controller would not show up properly in the BIOS/Platform Configuration (RBSU) PCI Devices menu when no drives were attached to the controller.<p>Addressed an issue where the chassis power supply information would not be properly reported from the Industry Standard SMBIOS records.<p>Addressed an issue where saving a setting from an Optional Devices configuration page, such as a Network Adapter, in the System Utilities menu would not be saved properly.<p>Addressed an issue where the system ROM would not correctly report a configurations error for the HPE Smart Battery storage subsystem when more devices were installed than could be supported by the installed battery.<p>Addressed an issue where a platform configured with direct attached NVMe hard drives may report the incorrect location (box and bay location) from the System Utilities page.<p>Addressed an issue where the System Utilities menu may not show the proper name for an optional PCIe Adapter.<p>Addressed an issue where the SMBIOS Type 3 record for chassis information may not properly report the chassis serial number.<p>Addressed an issue where the Integrated Lights Out (iLO) remote Console Keyboard and Mouse may not function properly when the system is configured for Legacy Boot Mode. This issue does not exist on systems configured in UEFI Boot Mode.<p>Addressed an issue where the chassis firmware revision would not be reported properly from the System Information page or Integrated Lights Out (iLO) web interface.<p>Addressed an issue where the HPE Jitter Performance feature settings could not be properly modified from the Integrated Lights Out web interface.<p>Addressed an issue where the system may report that the HPE Smart Battery is charging when in fact the battery has failed. It is recommended to flash to this system ROM if a system is reporting Smart Battery issues.<p>Addressed an issue where the Trusted Platform Module (TPM) option for TPM Visibility could not be configured through the RESTful API.<p>Addressed an issue where the system may become unresponsive when repeatedly typing characters, such as DIR, in Legacy Boot Mode from a pre-OS environment.  This issue does not impact systems in UEFI Boot Mode or a system once the system boots into an operating system.<p>Addressed an issue where certain third party PCIe adapters, such as a Dialogic adapter, would not function properly due to the PCIe Maximum Payload size being incorrectly programmed.<p>Addressed an issue where certain NVMe devices may not be detected when the x16 slot PCIe Riser and three slot x8 riser are present in the server.<p>Addressed an issue where a Network Boot option would still show an entry  in the Legacy Boot Order when Network Boot was disabled on the device from the BIOS/Platform Configuration (RBSU) Network Options Menu. This issue does not affect systems configured for UEFI Boot Mode.<p>Addressed an issue where the system may become unresponsive when using the TAB key in the BIOS/Platform Configuration (RBSU) menus.<p>Addressed an issue where the BIOS would not properly identify and halt a system from booting with an invalid DIMM configuration.<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) Energy Efficient Turbo setting was backwards.<p>Addressed an issue where the server might lockup and display a red screen when trying to repair a failed RAID volume off of a S100i SW RAID controller.<p>Addressed an issue where the server might become unresponsive during boot when trying to repair a failed RAID volume off of a S100i SW RAID controller.<p>Addressed an issue where the RESTful API may report that BIOS settings were not applied properly even when they are properly configured.<p>Addressed an issue where the system may become unresponsive during boot after a warm reset, typically seen with a blank screen, when a Trusted Platform Module (TPM) is installed.<p>Addressed an extremely rare issue where the system may incorrectly report a 413 Innovation Engine Authentication Error on a server reboot.<p>Removed support for the BIOS/Platform Configuration (RBSU) Power On Logo disable functionality.<p>Removed the Platform Configuration (RBSU) Option to enable or disable the Embedded Diagnostics.  Embedded Diagnostics is not supported on this server and the menu option should not have been available and was not functional.<p>Removed support for the Chipset based Firmware Trusted Platform Module (Intel PTT). This feature is no longer support due to stability issues. Users should instead install a discrete HPE TPM option for this support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
      <revision_fixes_xlate lang="tw">
        <revision_fixes_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the Embedded UEFI Shell restclient utility would not properly configure attributes for Network TLS (HTTPS) support.<p>Addressed an issue where the UEFI or Legacy Boot Order could still be modified after an incorrect Administrator Password was entered in the BIOS/Platform Configuration (RBSU) menus.<p>Addressed an issue where the embedded AHCI SATA controller would not show up properly in the BIOS/Platform Configuration (RBSU) PCI Devices menu when no drives were attached to the controller.<p>Addressed an issue where the chassis power supply information would not be properly reported from the Industry Standard SMBIOS records.<p>Addressed an issue where saving a setting from an Optional Devices configuration page, such as a Network Adapter, in the System Utilities menu would not be saved properly.<p>Addressed an issue where the system ROM would not correctly report a configurations error for the HPE Smart Battery storage subsystem when more devices were installed than could be supported by the installed battery.<p>Addressed an issue where a platform configured with direct attached NVMe hard drives may report the incorrect location (box and bay location) from the System Utilities page.<p>Addressed an issue where the System Utilities menu may not show the proper name for an optional PCIe Adapter.<p>Addressed an issue where the SMBIOS Type 3 record for chassis information may not properly report the chassis serial number.<p>Addressed an issue where the Integrated Lights Out (iLO) remote Console Keyboard and Mouse may not function properly when the system is configured for Legacy Boot Mode. This issue does not exist on systems configured in UEFI Boot Mode.<p>Addressed an issue where the chassis firmware revision would not be reported properly from the System Information page or Integrated Lights Out (iLO) web interface.<p>Addressed an issue where the HPE Jitter Performance feature settings could not be properly modified from the Integrated Lights Out web interface.<p>Addressed an issue where the system may report that the HPE Smart Battery is charging when in fact the battery has failed. It is recommended to flash to this system ROM if a system is reporting Smart Battery issues.<p>Addressed an issue where the Trusted Platform Module (TPM) option for TPM Visibility could not be configured through the RESTful API.<p>Addressed an issue where the system may become unresponsive when repeatedly typing characters, such as DIR, in Legacy Boot Mode from a pre-OS environment.  This issue does not impact systems in UEFI Boot Mode or a system once the system boots into an operating system.<p>Addressed an issue where certain third party PCIe adapters, such as a Dialogic adapter, would not function properly due to the PCIe Maximum Payload size being incorrectly programmed.<p>Addressed an issue where certain NVMe devices may not be detected when the x16 slot PCIe Riser and three slot x8 riser are present in the server.<p>Addressed an issue where a Network Boot option would still show an entry  in the Legacy Boot Order when Network Boot was disabled on the device from the BIOS/Platform Configuration (RBSU) Network Options Menu. This issue does not affect systems configured for UEFI Boot Mode.<p>Addressed an issue where the system may become unresponsive when using the TAB key in the BIOS/Platform Configuration (RBSU) menus.<p>Addressed an issue where the BIOS would not properly identify and halt a system from booting with an invalid DIMM configuration.<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) Energy Efficient Turbo setting was backwards.<p>Addressed an issue where the server might lockup and display a red screen when trying to repair a failed RAID volume off of a S100i SW RAID controller.<p>Addressed an issue where the server might become unresponsive during boot when trying to repair a failed RAID volume off of a S100i SW RAID controller.<p>Addressed an issue where the RESTful API may report that BIOS settings were not applied properly even when they are properly configured.<p>Addressed an issue where the system may become unresponsive during boot after a warm reset, typically seen with a blank screen, when a Trusted Platform Module (TPM) is installed.<p>Addressed an extremely rare issue where the system may incorrectly report a 413 Innovation Engine Authentication Error on a server reboot.<p>Removed support for the BIOS/Platform Configuration (RBSU) Power On Logo disable functionality.<p>Removed the Platform Configuration (RBSU) Option to enable or disable the Embedded Diagnostics.  Embedded Diagnostics is not supported on this server and the menu option should not have been available and was not functional.<p>Removed support for the Chipset based Firmware Trusted Platform Module (Intel PTT). This feature is no longer support due to stability issues. Users should instead install a discrete HPE TPM option for this support.<P><B>Known Issues:</B></P>None]]>
</revision_fixes_xlate_part>
      </revision_fixes_xlate>
    </revision>
    <revision>
      <version value="1.00_06-01-2017" revision="" type_of_change="1"/>
      <revision_enhancements_xlate lang="en">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>This is the initial version of the firmware.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="cn">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>This is the initial version of the firmware.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ja">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>重要な注意：</B></P>なし<P><B>ファームウェアの依存関係：</B></P>なし<P><B>改善点/新しい機能：</B></P>これは、このファームウェアでの最初のバージョンです。<P><B>既知の問題点：</B></P>なし]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="ko">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>This is the initial version of the firmware.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
      <revision_enhancements_xlate lang="tw">
        <revision_enhancements_xlate_part>
<![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Enhancements/New Features:</B></P>This is the initial version of the firmware.<P><B>Known Issues:</B></P>None]]>
</revision_enhancements_xlate_part>
      </revision_enhancements_xlate>
    </revision>
  </revision_history>
  <sw_keys>
    <sw_keys_and>
      <sw_key guid="" name="U32">
        <sw_key_expectedpath>firmware:system</sw_key_expectedpath>
      </sw_key>
    </sw_keys_and>
  </sw_keys>
<payload>
  <DeviceClass>aa148d2e-6e09-453e-bc6f-63baa5f5ccc4</DeviceClass>
  <Devices>
    <Device>
      <DeviceName>System BIOS - U32</DeviceName>
      <FirmwareImages>
        <DelayAfterInstallSec>0</DelayAfterInstallSec>
        <DirectFlashOk>True</DirectFlashOk>
        <FileName>U32_3.00_10_19_2023.signed.flash</FileName>
        <InstallDurationSec>120</InstallDurationSec>
        <Order>1</Order>
        <PLDMImage>False</PLDMImage>
        <ResetRequired>True</ResetRequired>
        <SysPowerON>False</SysPowerON>
        <Type>Firmware</Type>
        <UefiFlashable>True</UefiFlashable>
      </FirmwareImages>
      <Target>00000000-0000-0000-0000-000000000204</Target>
      <Version>v3.00 (10/19/2023)</Version>
    </Device>
  </Devices>
  <PackageFormat>Windows</PackageFormat>
  <Type>Firmware</Type>
  <UpdatableBy>Uefi</UpdatableBy>
  <UpdatableBy>RuntimeAgent</UpdatableBy>
</payload>
  <prerequisites>
    <supported_operating_systems>
      <supported_operating_system platform="nt_x86-64" major="6" minor="3" sr="OEM" name="Microsoft Windows Server 2012 R2"/>
      <supported_operating_system platform="nt_x86-64" major="10" minor="0" sr="OEM" minimumbuild="17600" maximumbuild="18999" name="Microsoft Windows Server 2019"/>
      <supported_operating_system platform="nt_x86-64" major="10" minor="0" sr="OEM" minimumbuild="20317" name="Microsoft Windows Server 2022"/>
      <supported_operating_system platform="nt_x86-64" major="10" minor="0" sr="OEM" minimumbuild="14393" maximumbuild="17599" name="Microsoft Windows Server 2016"/>
    </supported_operating_systems>
    <supported_devices/>
    <required_diskspace size_kb="11000"/>
  </prerequisites>
  <installation>
    <install>
      <install_caps silent="yes" needuseracct="no"/>
      <command>cpqsetup.exe</command>
      <command_params></command_params>
      <reboot_required value="yes"/>
      <reboot_details value="Required">
        <reboot_details_xlate lang="en">Reboot is required after installation for updates to take effect and hardware stability to be maintained.</reboot_details_xlate>
        <reboot_details_xlate lang="cn">安装之后必须重启才能使更新生效并保持硬件稳定性。</reboot_details_xlate>
        <reboot_details_xlate lang="ja">アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要です。</reboot_details_xlate>
        <reboot_details_xlate lang="ko">업데이트가 적용되고 하드웨어 안정성이 유지되려면 설치 후 재부팅해야 합니다.</reboot_details_xlate>
        <reboot_details_xlate lang="tw">安裝後必須重新啟動，更新才會生效，並維持硬體穩定。</reboot_details_xlate>
      </reboot_details>
      <per_device_install_time_seconds>300</per_device_install_time_seconds>
    </install>
    <uninstall>
      <uninstall_caps silent="no"/>
      <command></command>
      <command_params></command_params>
      <reboot_required value="no"/>
    </uninstall>
  </installation>
</cpq_package>
