Dear Cisco Customer,
Cisco engineering has identified the following software issues with the release that you have selected that may affect your use of this software. Please review the Software Advisory notice here to determine if the issues apply to your environment. You may proceed to download this software if you have no concerns with the issue described.
For more comprehensive information about what is included in this software, refer to the Cisco software Release Notes, available from the Product Selector tool. From this page, select the product you are interested in. Release Notes are under "General Information" on the product page.
Affected Software and Replacement Solution for CSCvh31577, CSCvg97982
|
||
Software Type |
Software Affected |
Software Solution |
UCS Manager and Cisco IMC Software |
Version: UCS Manager 3.2(2e) Cisco IMC 3.1(2e)
Affected Images:
|
Version: TBD
Replacement Images: TBD |
Reason for Advisory:
This software advisory addresses one software issue related to CVE-2017-5715 [Spectre/Variant 2].
CSCvh31577
Side Channel Analysis vulnerability - M5 B- and C-series servers UCSM managed
CSCvg97982
Side Channel Analysis vulnerability - M5 servers
Affected Platforms:
UCS B-Series M5 Servers
UCS C-Series M5 Servers
Hyperflex M5 Servers
Symptom: Intel released a statement on January 22, 2018 with additional information about a reboot issue associated with the microcode update for Broadwell, Haswell, Skylake and other processors, and is advising customers to not deploy select versions of the previously provided microcode. As a result, Cisco removed UCS Manager 3.2(2e) and Cisco IMC 3.1(2e) from Cisco.com.
Conditions: Customers who have deployed UCS Manager 3.2(2e) or Cisco IMC Software 3.1(2e) B or C Bundles on Cisco UCS or Hyperflex M5 Servers
Workaround: Please see the Cisco Security Advisory at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel. Please do not deploy UCS Manager 3.2(2e) or Cisco IMC 3.1(2e).
More Info: