cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
584
Views
0
Helpful
1
Replies

CSCvg97965 - Side Channel Analysis vulnerability - M3 B- and C-series servers UCSM managed - 2

npanari01
Level 1
Level 1

Hi, my current versions are as below and please let me know is fixes are available now against vulnerability  CVE-20175753, CVE-20175754 and CVE-20175715.   
     
  Product name :- UCS C220 M3S   
  C220M3.1.5.4f.0 (Build Date: 11/13/2013)    
  Firmware Version: 2.0(6d)   

1 Reply 1

Leo Laohoo
Hall of Fame
Hall of Fame

Intel has released an "advisory" aimed at everyone to STOP the rollout of the patches/fixes for Meltdown and Spectre vulnerability because it was borking a lot (and I mean A LOT!) of machines.   

We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior. 


This advisory was made a few days after Linus Torvalds "losing it" was made public (HERE).  Fun reading. 

What I'm trying to say is all fixes have been pulled because no one knows what damages it will cause when applied.  Everyone will have to wait-and-see.