I am planning to upgrade our UCS B-Series server(B200M2) to 2.2(1d) from 2.1(1d).
While i was reading the Cisco document for the upgrade, they were specifying about a bug CSCuh61202 ( https://tools.cisco.com/bugsearch/bug/CSCuh61202 ) .It is saying that "If you are upgrading from a release prior to 2.1(3a) or 2.2(1b), you may be impacted by CSCuh61202.".
But while i am reading about the bug, it that it is saying that the affected version is 2.1(2a)A.
So my question is, should i bother about this bug ,since my current version is 2.1(1d). ????
When upgrading your environment, you should still consider this defect. The reason for this is because when they said that it was found on 2.1(2a), it means that this is the release when it was first found, it doesn't mean that it is the only version that is affected by this defect. If any of your blades are using the 1240 or the 1280 VIC adapter, I highly recommend you to take in consideration this defect.
I contacted cisco TAC prior to my upgrade..
They also confirmed that if the current version is running prior to 2.1(3a) , then i should upgrade server firmware first and then upgrade the Infrastructure Firmware.
I followed it and the upgrade was successful. I upgraded the UCS in DR first and observed for a week. Everything is working fine. Then last Sunday i upgraded the UCS in DC. Done :)
Thanks for the follow up. I was wondering about the adapter vs blade firmware application. The upgrade document says to upgrade the adapters before starting infrastructure firmware, but the bug report says to schedule adapter/blade firmware upgrade before starting the infrastructure upgrade. If I am reading your last post correclty you upgraded the blades and not just the adapters prior to your infrastructure upgrade and all went well. Did I read that correctly? Thanks.
in our environment also, its full of cisco devices and mostly all devices were affected by this shellshock bash vulnerability. i contacted cisco TAC for querying about all those devices we implemented but since each TAC engineer are specialized on a specific domain...they were unable to answer all. Other wise i need to raise separate TAC for each devices. when i checked their releases before few days, they said that there is no work around at the device side. They asked to harden the firewall and IPS. Actually they released IPS signature to prevent the shellshock attack.
Also you should upgrade both infrastructure and server firmware. Both firmwares should be of same version.
I recommend you to open a TAC request and keep the engineer on hold while you performing the upgrade process.