================================================================================
Express5800/R110j-1
System ROM U43 v2.20 (10/27/2020)
================================================================================
Software name : Express5800/R110j-1
System ROM (BIOS) update module
Models : Express5800/R110j-1
Operating System : This software supports offline update and the following OS.
- Windows Server(R) 2012 R2
- Windows Server(R) 2016
- Windows Server(R) 2019
- Red Hat(R) Enterprise Linux(R) 7
Target Users : See [Target Users for Update] below
Type : System ROM
================================================================================
[About the software]
The Express5800/R110j-1 System ROM (BIOS) update module supports the following
changes in the Express5800/R110j-1 models:
Notes:
- Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled
in a system equipped with the following specific processors.
System Utilities > System Configuration >
RBSU > Processor Options >
Intel(R) Software Guard Extensions(SGX)
Note) CPU board(4C/i3-8300) [N8101-1515]
CPU board(2C/Pentium G5400) [N8101-1512]
- And, when system updated to System ROM v2.20 (10/27/2020) or later, it should
be updated Server Platform Services(SPS) Firmware 5.1.4.208 or later
at the same time.
SPS Firmware 5.1.4.208
- Improved the function to set the memory frequency. Fault tolerance of the system
is improved.
The memory frequency will be set 2666MHz when all of the following requirements are
met. If not satisfied, the memory frequency will be set 2400MHz.
- Intel (R) Xeon (R) E Processor is equipped.
- Memories with the same part number are mounted on the same channel.
Note) The memory part number can be confirmed in the following items of
System Utilities.
System Utilities > System Information > Memory Information >
Part Number
Note) In case of R110j-1, memory frequency will be set lower frequency
depending on memory configuration.
Enhancements and problem fixes:
- Added a new BIOS/Platform Configuration (RBSU) option to Memory Options
called Refresh Watermarks. When selecting the Low Watermark setting,
the memory controller will help reduce susceptibility to a DDR4 RowHammer
attack. It is expected that a memory performance impact will be seen when
enabling the Low Watermark setting.
System Utilities > System Configuration > RBSU > Memory Options
- Updated the RESTful API BIOS Attribute Registry resources to match the
latest BIOS/Platform Configuration(RBSU) options.
- Updated microcode for Processor.
Intel(R) Xeon(R) E Processor
Intel(R) Pentium(R) Gold Processor Series
8th Generation Intel(R) Core(TM) i3 Processors
- Addressed following security vulnerabilities.
INTEL-SA-00381, INTEL-SA-00389, INTEL-SA-00358.
- Addressed an issue where system may suddenly stop responding, shutdown or
restart unexpectedly.
Integrated Management Log (IML) contains the following information.
- Class: 0x32, Code: 0x389 Unexpected Shutdown and Restart...
And, it should be updated Server Platform Services(SPS) Firmware
at the same time.
For the detail of the SPS firmware, refer to "Notes" in [About the software].
** Program and data included in this software **
Following program and data are included in this software.
Use one of them according to the way of installation.
a) Flash image for System Utilities/iLO Web User Interface
firmware\U43_2.20_10_27_2020.signed.flash
b) Executables for Windows(R)
winx64\cp045784.exe
c) RPM package for Linux(R)
Linux\firmware-system-oem-u43-2.20_2020_10_27-1.1.x86_64.rpm
-------------------------------------------------------------------------------
[ Target Users for Update ]
This software is available for the users who use the following models with the
following System ROM version.
- Models to be supported
1. Express5800/R110j-1
- System ROM Versions to be supported
1. U43 v1.02 (10/02/2018)
2. U43 v1.03 (11/28/2018)
3. U43 v1.20 (02/02/2019)
4. U43 v1.22 (04/04/2019)
5. U43 v2.00 (05/16/2019)
6. U43 v2.10 (09/12/2019)
7. U43 v2.12 (12/06/2019)
8. U43 v2.14 (03/09/2020)
9. U43 v2.16 (05/25/2020)
10. U43 v2.18 (06/24/2020)
Note: In case of using newer System ROM from the above version, it has already
applied equivalent enhancements. Updating the System ROM isn't needed.
Be sure to check the System ROM version and date with the following procedures.
Select an arbitrary procedure and check the version before and after the update.
** System Utilities **
You can check the System ROM version and date by the following procedure.
1. Power on the system and the contents of process by POST (Power On Self-
Test) will be shown on the screen. After a short time, the following
message is shown. Press <F9> key, "System Utilities" is started.
[F9] System Utilities
2. After starting "System Utilities", select "System Information".
3. Select "Firmware Information".
4. Each firmware version is shown on the screen. The System ROM version and
date can be seen at "System ROM" option.
Note: After checking the System ROM version, press the <ESC> key or
select "Exit" to exit the System Utilities.
Note: About detail of "System Utilities" usage, refer to "1. System
Utilities" section in the chapter of "Useful Features" of the
maintenance guide.
** Windows(R) OS **
You can check the System ROM date by a following procedure.
1. Hold down <Windows> key and press <R> key.
2. In the "Run" dialog box, type "msinfo32" and then click "OK".
3. After "System Information" has started, select "System Summary".
4. Check the System ROM version by the profile of "BIOS Version/Date".
** Linux(R) OS **
You can check the System ROM date by a following procedure.
1. Launch the terminal such as xterm.
2. Execute the command as follows.
# /usr/sbin/dmidecode | less
Note: "#" means prompt. You do not need to input "#".
3. Check the System ROM date by "BIOS Information->Release Date".
Note: The dmidecode command has to be installed.
Be certain to read carefully the following NEC software license agreement
before applying this software update module. If you can not agree to the terms
of the agreement, do not download this software. By downloading the software
you will be bounded by the terms of the agreement.
<User License Agreement>
NEC Corporation ("NEC") grants you the right to use the software
program ("Software") under the terms and conditions of this Agreement
only in the country where you acquired the Software. You shall agree to all
provisions of this Agreement and assume responsibility for selection,
installation, use and effect of the Software purchased for your desired effect.
1. Period
1.1 This Agreement shall come into force on the day of the first download.
1.2 You may terminate the license granted hereunder by notifying us in writing
at least one month prior to the desired termination date.
1.3 NEC may terminate the license granted you hereunder at any time if you
fail to comply with any terms and conditions of this Agreement.
1.4 The license to the Software shall remain in force until the license is
terminated on the date set forth hereunder.
1.5 Upon termination of the license, other rights granted you hereunder shall
also be terminated. You must destroy, uninstall or dispose of the Software,
any copies of the Software and other materials provided with the Software.
2. Right of use
2.1 You may use the Software only on the purchased products, the products
which NEC defines as the supported models for the Software.
2.2 NEC grants you the right to use the Software only in the country in which
you acquired the Software in accordance with the conditions of the
preceding paragraph.
3. Intellectual Property Rights including patent and copyright
All of the intellectual property rights to the Software including patent
and copyright belong to NEC and/or the owners of the copyright or any
other intellectual property rights to the Software. No Intellectual
Property Rights including patent and copyright to the Software shall be
transferred to you. The Intellectual Property Rights can be protected as
a matter of Japan, U.S.A., and any other applicable laws and regulations.
4. Copying, altering, and combining of the Software
4.1 You may only make one copy of the Software solely for a backup purpose,
provided, however, that the copy of the Software is loaded into permanent
memory of the system (such as a hard disk drive). You may store the
Software solely to prevent damages or loss of the memory media.
4.2 You shall place the copyright notice and other legends on each copy of the
Software.
4.3 You may not use, copy, alter, combine, publish, reproduce the Software
over the Internet, or otherwise dispose of the Software except as provided
in this Agreement.
4.4 You may not copy, publish the manual and other related documentation
provided with the Software, or reproduce such manual and documentation
over the Internet.
4.5 No intangible property right to the Software shall be transferred to you.
5. Transfer
You may not sublicense, assign, transfer, or otherwise dispose of the Software
or the right of use to any third party except as provided herein.
6. Reverse compile
You may not reverse engineer, decompile, or otherwise disassemble the Software.
7. Limitation of warranties
7.1 THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. NEC
DISCLAIMS ALL WARRANTIES FOR THE SOFTWARE, EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE. FURTHER, NEC MAKES NO REPRESENTATION OR WARRANTY THAT
THE USE OF ANY SOFTWARE WILL NOT INFRINGE ANY THIRD PARTY'S RIGHTS,
INCLUDING BUT NOT LIMITED TO, ANY INTELLECTUAL PROPERTY RIGHTS. IN NO EVENT
SHALL NEC BE HELD LIABLE WITH RESPECT TO ANY CLAIM BY YOU OR ANY THIRD
PARTY ON ACCOUNT OF OR ARISING OUT OF THE USE OF THE SOFTWARE.
7.2 Notwithstanding the provisions of the preceding paragraph, in case NEC
makes any bug-fix version to the Software, NEC will, at its expense,
furnish you with such bug-fix version, update version, or information in
relation to such bug-fix or update version both in the source code form and
object code form, and such bug-fix version or update version shall be
considered as the licensed Software.
8. No liability
IN NO EVENT SHALL NEC BE LIABLE FOR ANY INDIRECT OR CONSEQUENTIAL DAMAGES OR
LOSS OF PROFIT OR DAMAGES BASED ON ANY THIRD PARTY CLAIM, EVEN IF NEC HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
9. Miscellaneous
9.1 This Agreement shall be governed by the laws of the country in which you
acquired the Software.
9.2 You agree that NEC inspects the use of the Software and provides the
information of the inspection to the owner of the copyright to the
Software.
9.3 If the Software is licensed for use in the performance of a U.S. Government
prime contract or subcontract, You agree that, consistent with FAR 12.211
and 12.212, commercial computer Software, computer Software documentation
and technical data
for commercial items are licensed under this Agreement.
9.4 If the Software has a file written about software license (hereinafter
referred to as "License File"), the terms of License File are applied to
the files specified in License File, regardless of the above-mentioned
Agreement.
================================================================================
System ROM Installation Procedure
================================================================================
** System Utilities **
[ Preparation ]
- USB memory x1
1. Preparation of flash image (*.flash)
(1) Prepare the USB memory that is formatted with FAT or FAT32.
(2) Copy "a) Flash image for System Utilities/iLO Web User Interface file"
(approx. size 32MB) to a USB memory.
2. System ROM installation procedure
Install the System ROM by a following procedure.
(1) Attach the USB memory created in the procedure of "1" and power on the
system.
(2) In POST, press <F9> key to enter System Utilities.
(3) Select "Embedded Applications > Firmware Update > System ROM" menu.
(4) Choose "Select Firmware File", and then select the device in which flash
image was copied.
(5) Select flash image (i.e. *.flash).
(6) Select "Start Firmware Update".
(7) When the popup message of "Press ENTER to start firmware update.
This process might take a few minutes..." is shown, press <ENTER> key.
Update process is started.
(8) The progress of the update is shown. When it's completed, the popup
message of "Firmware update completed successfully." is shown. Press
<ENTER> key, the message is closed.
(9) Detach the Installation USB memory from the system.
(10) Reboot the system; Select the "Reboot the System" option at top
level menu of System Utilities.
(11) Wait reboot completion for update to take effect.
The installation is successfully finished.
** iLO Web User Interface **
1. Preparation of flash image (*.flash)
(1) Copy "a) Flash image for System Utilities/iLO Web User Interface file"
(i.e. *.flash) to any location which is accessible from the remote PC.
2. System ROM installation procedure
(1) Start the Web Browser on remote PC. And log-in to the iLO Web User
Interface by a "Configure to iLO Settings" privilege user.
(2) Select "Firmware & OS Software tab" from the right menu.
(3) Select "Update Firmware" from the left menu.
(4) Select the flash image, copied by a procedure of "1."
(5) Press "Flash" to begin update process.
(6) Wait for the "Firmware Update Completed." message to display.
(7) Reboot the system.
(8) Wait reboot completion for update to take effect.
The installation is successfully finished.
** Windows(R) OS **
1. Preparation of Installation
(1) Log on to the system as a user with administrator privilege.
(2) Terminate all running application.
(3) Copy "b) Executables for Windows(R) file" to a suitable
folder.
2. System ROM installation procedure
(1) Double-click "b) Executables for Windows(R) file" (i.e. *.exe).
The System ROM Update Program will start.
(2) Follow the messages will be shown and complete the operation.
(3) If the messages requesting reboot will be shown, select "yes" to reboot
of the system.
(4) Wait reboot completion for update to take effect.
The installation is successfully finished.
** Linux(R) OS **
1. Preparation of Installation
(1) Log-in as root. Or switch to root with "su" command.
(2) Terminate all running application.
(3) Copy "c) RPM package for Linux(R) file" to a suitable directory.
e.g. /root
2. System ROM installation procedure
(1) Install the RPM package of this System ROM update module by the command
below.
# rpm -Uvh <filename>.rpm
Note: The "<filename>.rpm" should replace to RPM package name which
is described at above "Binaries of this release" section.
Note: "#" means prompt. You do not need to input "#".
(2) See where the files land by the command below.
# rpm -qlp <filename>.rpm
(3) Change to the directory you see in the previous step.
(4) Run setup by the command below.
# ./setup
(5) Follow the messages will be shown and complete the operation.
(6) If a reboot inquiry is appear then press "y" to trigger reboot.
(7) Wait reboot completion for update to take effect.
The installation is successfully finished.
** Other OSes (e.g. VMware(R), etc.) **
Use the one of following procedures to update:
- Install the System ROM from System Utilities
- Install the System ROM from iLO Web User Interface
================================================================================
Notes
================================================================================
** Notes in general **
* Refer to "license_en.txt" about the user license agreement.
* When you install the system ROM, the flashing mechanism writes over the
backup ROM and saves current ROM as a backup, enabling you to switch easily
to the alternate ROM version if the new ROM becomes corrupted for any
reason. This feature protects the existing ROM version, even if you
experience a power failure while flashing the ROM.
* When Windows(R) BitLocker(TM) function is set to "Enabled", install the
System ROM after making the function "Disabled". Then make the function
"Enabled" after install and reboot of the system. If you install the system
ROM without making the function "Disabled", you may need the recovery
password when you boot the system.
* This software does not support a virtualized environment such as hyper
visor, guest OS, etc. Please install either on the OS which this software
supports or with the method of offline installation.
* To meet firmware dependencies, you can update iLO firmware by latest
Starter Pack. And you can update Innovation Engine(IE) firmware by latest
"Server Platform Services(SPS) firmware update module and Innovation
Engine(IE) firmware update module".
You can download latest update module(s) from the following web site.
https://www.nec.com/express
("Support & Downloads" of the page top - PCs & Servers - Servers - Downloads
- Select Model)
** Note for Windows(R) OS environment and Linux(R) OS environment **
* This software will access to iLO5 (Baseboard Management Controller). It is
required that the "iLO 5 Channel Interface Driver" (CHIF) must be installed.
The CHIF driver can be installed by using EXPRESSBUILDER or "Starter Pack".
--------------------------------------------------------------------------------
[Revision history]
Version:2.20 (10/27/2020)
Notes:
- Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled
in a system equipped with the following specific processors.
System Utilities > System Configuration >
RBSU > Processor Options >
Intel(R) Software Guard Extensions(SGX)
Note) CPU board(4C/i3-8300) [N8101-1515]
CPU board(2C/Pentium G5400) [N8101-1512]
- And, when system updated to System ROM v2.20 (10/27/2020) or later, it should
be updated Server Platform Services(SPS) Firmware 5.1.4.208 or later
at the same time.
<https://www.58support.nec.co.jp/global/download/070742-G02/index.html>
- Improved the function to set the memory frequency. Fault tolerance of the system
is improved.
The memory frequency will be set 2666MHz when all of the following requirements are
met. If not satisfied, the memory frequency will be set 2400MHz.
- Intel (R) Xeon (R) E Processor is equipped.
- Memories with the same part number are mounted on the same channel.
Note) The memory part number can be confirmed in the following items of
System Utilities.
System Utilities > System Information > Memory Information >
Part Number
Note) In case of R110j-1, memory frequency will be set lower frequency
depending on memory configuration.
Enhancements and problem fixes:
- Added a new BIOS/Platform Configuration (RBSU) option to Memory Options
called Refresh Watermarks. When selecting the Low Watermark setting,
the memory controller will help reduce susceptibility to a DDR4 RowHammer
attack. It is expected that a memory performance impact will be seen when
enabling the Low Watermark setting.
System Utilities > System Configuration > RBSU > Memory Options
- Updated the RESTful API BIOS Attribute Registry resources to match the
latest BIOS/Platform Configuration(RBSU) options.
- Updated microcode for Processor.
Intel(R) Xeon(R) E Processor
Intel(R) Pentium(R) Gold Processor Series
8th Generation Intel(R) Core(TM) i3 Processors
- Addressed following security vulnerabilities.
INTEL-SA-00381, INTEL-SA-00389, INTEL-SA-00358.
- Addressed an issue where system may suddenly stop responding, shutdown or
restart unexpectedly.
Integrated Management Log (IML) contains the following information.
- Class: 0x32, Code: 0x389 Unexpected Shutdown and Restart...
And, it should be updated Server Platform Services(SPS) Firmware
at the same time.
For the detail of the SPS firmware, refer to "Notes" in [About the software].
Version:2.18 (06/24/2020)
Notes:
- Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled
in a system equipped with the following specific processors.
System Utilities > System Configuration >
RBSU > Processor Options >
Intel(R) Software Guard Extensions(SGX)
Note) CPU board(4C/i3-8300) [N8101-1515]
CPU board(2C/Pentium G5400) [N8101-1512]
- Improved the function to set the memory frequency. Fault tolerance of the system
is improved.
The memory frequency will be set 2666MHz when all of the following requirements are
met. If not satisfied, the memory frequency will be set 2400MHz.
- Intel (R) Xeon (R) E Processor is equipped.
- Memories with the same part number are mounted on the same channel.
Note) The memory part number can be confirmed in the following items of
System Utilities.
System Utilities > System Information > Memory Information >
Part Number
Note) In case of R110j-1, memory frequency will be set lower frequency
depending on memory configuration.
Enhancements and problem fixes:
- Updated microcode for Processor. This version mitigates security
vulnerability of CVE-2020-0543, CVE-2020-0548, CVE-2020-0549.
Intel(R) Xeon(R) E Processor
Intel(R) Pentium(R) Gold Processor Series
8th Generation Intel(R) Core(TM) i3 Processors
Version:2.16 (05/25/2020)
Notes:
- Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled
in a system equipped with the following specific processors.
System Utilities > System Configuration >
RBSU > Processor Options >
Intel(R) Software Guard Extensions(SGX)
Note) CPU board(4C/i3-8300) [N8101-1515]
CPU board(2C/Pentium G5400) [N8101-1512]
- Improved the function to set the memory frequency. Fault tolerance of the system
is improved.
The memory frequency will be set 2666MHz when all of the following requirements are
met. If not satisfied, the memory frequency will be set 2400MHz.
- Intel (R) Xeon (R) E Processor is equipped.
- Memories with the same part number are mounted on the same channel.
Note) The memory part number can be confirmed in the following items of
System Utilities.
System Utilities > System Information > Memory Information >
Part Number
Note) In case of R110j-1, memory frequency will be set lower frequency
depending on memory configuration.
Enhancements and problem fixes:
- Updated to the latest thermal support for the platform.
- Updated the RESTful API BIOS Attribute Registry resources to match the
latest BIOS/Platform Configuration(RBSU) options.
- Updated microcode for Processor.
Intel(R) Xeon(R) E Processor
Intel(R) Pentium(R) Gold Processor Series
8th Generation Intel(R) Core(TM) i3 Processors.
- Addressed following security vulnerabilities.
CVE-2020-0528, CVE-2020-0529
- Addressed an issue where the serial port would not function properly when
the Serial CLI Status was also enabled on the server. This could lead to
the serial BAUD rate not being configured properly and the serial output from
the host would be corrupted or no output would be seen.
System Configuration > BMC Configuration Utility > Setting Options
> Serial CLI Status
- Addressed an extremely rare issue where the server could become unresponsive
in POST when configured in Legacy BIOS Mode at Boot Mode option when a
USB Mouse is attached. This issue does not impact systems configured in
UEFI Mode.
System Configuration > RBSU > Boot Options > Boot Mode
- Addressed an issue where boot devices could disappear from the Boot Options
menu when pressing the <F10> or <F12> key to save boot order changes.
System Configuration > RBSU > Boot Options
- Addressed an issue where the server may become unresponsive during POST when
both iLO and the server are reset simultaneously.
- Addressed an issue where the System Utilities System Information data could
not be successfully exported to an FTP network location.
Version:2.14 (03/09/2020)
Notes:
- Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled
in a system equipped with the following specific processors.
System Utilities > System Configuration >
RBSU > Processor Options >
Intel(R) Software Guard Extensions(SGX)
Note) CPU board(4C/i3-8300) [N8101-1515]
CPU board(2C/Pentium G5400) [N8101-1512]
- Improved the function to set the memory frequency. Fault tolerance of the system
is improved.
The memory frequency will be set 2666MHz when all of the following requirements are
met. If not satisfied, the memory frequency will be set 2400MHz.
- Intel (R) Xeon (R) E Processor is equipped.
- Memories with the same part number are mounted on the same channel.
Note) The memory part number can be confirmed in the following items of
System Utilities.
System Utilities > System Information > Memory Information >
Part Number
Note) In case of R110j-1, memory frequency will be set lower frequency
depending on memory configuration.
Enhancements and problem fixes:
- Updated the UEFI driver of Smart Array S100i Software RAID.
Addressed an issue where the Smart Array S100i Software RAID may experience
potential data inconsistency during initial configuration or operation of
a RAID volume configured in RAID 0/1/10.
Version:2.12 (12/06/2019)
Notes:
- Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled
in a system equipped with the following specific processors.
System Utilities > System Configuration >
RBSU > Processor Options >
Intel(R) Software Guard Extensions(SGX)
Note) CPU board(4C/i3-8300) [N8101-1515]
CPU board(2C/Pentium G5400) [N8101-1512]
- Improved the function to set the memory frequency. Fault tolerance of the system
is improved.
The memory frequency will be set 2666MHz when all of the following requirements are
met. If not satisfied, the memory frequency will be set 2400MHz.
- Intel (R) Xeon (R) E Processor is equipped.
- Memories with the same part number are mounted on the same channel.
Note) The memory part number can be confirmed in the following items of
System Utilities.
System Utilities > System Information > Memory Information >
Part Number
Note) In case of R110j-1, memory frequency will be set lower frequency
depending on memory configuration.
Enhancements and problem fixes:
- Updated microcode for Processor. This version mitigates security
vulnerability of CVE-2019-11157.
Intel(R) Xeon(R) E Processor
Intel(R) Pentium(R) Gold Processor Series
8th Generation Intel(R) Core(TM) i3 Processors
Version:2.10 (09/12/2019)
Notes:
- Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled
in a system equipped with the following specific processors.
System Utilities > System Configuration >
RBSU > Processor Options >
Intel(R) Software Guard Extensions(SGX)
Note) CPU board(4C/i3-8300) [N8101-1515]
CPU board(2C/Pentium G5400) [N8101-1512]
- Improved the function to set the memory frequency. Fault tolerance of the system
is improved.
The memory frequency will be set 2666MHz when all of the following requirements are
met. If not satisfied, the memory frequency will be set 2400MHz.
- Intel (R) Xeon (R) E Processor is equipped.
- Memories with the same part number are mounted on the same channel.
Note) The memory part number can be confirmed in the following items of
System Utilities.
System Utilities > System Information > Memory Information >
Part Number
Note) In case of R110j-1, memory frequency will be set lower frequency
depending on memory configuration.
Enhancements and problem fixes:
- Addressed following security vulnerabilities.
CVE-2017-5715
CVE-2018-12126
CVE-2018-12127
CVE-2018-12130
CVE-2019-11135
CVE-2018-11091
- Updated microcode for processor.
Intel(R) Xeon(R) E Processor
Intel(R) Pentium(R) Gold Processor Series
8th Generation Intel(R) Core(TM) i3 Processors
Version:2.00 (09/05/2019)
Notes:
- Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled
in a system equipped with the following specific processors.
System Utilities > System Configuration >
RBSU > Processor Options >
Intel(R) Software Guard Extensions(SGX)
Note) CPU board(4C/i3-8300) [N8101-1515]
CPU board(2C/Pentium G5400) [N8101-1512]
Enhancements and problem fixes:
- Updated to the latest thermal support for the platform.
- Addressed following security vulnerabilities.
CVE-2019-1559
- Addressed an issue where the Intel Software Guard Extensions(SGX) Remote
attestation functionality may not work properly.
- Addressed an issue where the Server Backup and Restore functionality may not
work properly if initiated through the RESTful API returning a message "An
internal error occurred during RIS operation".
- Addressed an issue where the system would not boot to a USB drive when
a non-bootable (non-formatted) drive was also present in the system.
This issue only impacts systems configured in Legacy BIOS Mode.
System Utilities > System Configuration >
RBSU > Boot Options > Boot Mode
Version:1.22 (04/04/2019)
Notes:
- Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled
in a system equipped with the following specific processors.
System Utilities > System Configuration >
RBSU > Processor Options >
Intel(R) Software Guard Extensions(SGX)
Note) CPU board(4C/i3-8300) [N8101-1515]
CPU board(2C/Pentium G5400) [N8101-1512]
Enhancements and problem fixes:
- Updated microcode for processor. This version mitigates security
vulnerability of CVE-2018-12126, CVE-2018-12130, CVE-2018-12127,
CVE-2019-11091.
Intel(R) Xeon(R) E Processor
Intel(R) Pentium(R) Gold Processor Series
8th Generation Intel(R) Core(TM) i3 Processors
Version:1.20 (02/02/2019)
Notes:
- Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled
in a system equipped with the following specific processors.
System Utilities > System Configuration >
RBSU > Processor Options >
Intel(R) Software Guard Extensions(SGX)
Note) CPU board(4C/i3-8300) [N8101-1515]
CPU board(2C/Pentium G5400) [N8101-1512]
Enhancements and problem fixes:
- Added a new "Backup and Restore Settings" menu to "System Default Options"
in the BIOS/Platform Configuration (RBSU). This option allows you to save
the BIOS configuration to a USB storage device.
- Updated description of Japanese and Chinese for System Utilities.
- Updated the RESTful API BIOS Attribute Registry resources to match the
latest BIOS/Platform Configuration(RBSU) options.
- Addressed following security vulnerabilities.
CVE-2018-3613, CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179,
CVE-2018-12180, CVE-2018-12181, CVE-2018-12182, CVE-2018-12183
- Addressed an issue where certain PCIe option cards may not train properly
and cause the system to hang during POST.
- Addressed an issue where iLO virtual media may not boot properly after
setting the "Boot on Next Reset" option in the "Remote Console and Media -
Virtual Media" settings in the iLO web interface.
- Addressed an issue where the AHS Download application from the Embedded
Applications in System Utilities may fail to work properly with iLO
firmware 1.30 or later.
- Addressed an issue where an optional SATA DVD drive may not unlock and
allow media to be ejected after an operating system reboot.
- Addressed an issue where the system may become unresponsive during boot and
experience a Red Screen (RSOD) when booting in Legacy BIOS Mode with a
M.2 SATA SSD installed. This issue does not impact systems in UEFI Mode.
--------------------------------------------------------------------------------
[Copyright and Trademark]
All contents on this software are the copyright of NEC Corporation or the
third-party software developer. All other contents mentioned herein are
copyright of their respective owners.
Microsoft, Windows, Windows Server are trademarks or registered trademarks of
Microsoft Corporation in the United States and other countries.
Linux(R) is a registered trademark of Linus Torvalds in the United States and
other countries.
Red Hat is a trademark or a registered trademark of Red Hat Inc. in the United
States and other countries.
All other company names and product names mentioned herein are registered
trademarks or trademarks of their respective owners.
--------------------------------------------------------------------------------
Copyright NEC Corporation 2021