Processor Vulnerability Update – Spectre & Meltdown
Due to the recent discovery of microprocessor vulnerabilities that could have an impact on BIOS IT systems, we are advising customers to run a microcode update of the system BIOS along with an operating system update. Some systems (especially X11) will have already received the BIOS update at the end of November, and may not need to be updated. Customers can check the currently installed version on the first page of the BIOS screen, in the IPMI Web UI, or dmidecode.
Please refer to Supermicro’s website for information on the available options to address the issue. More systems will be added as soon as they are available. There are several options to upgrade the system BIOS depending Intel CPU generation and operating system.
Commonly referred to as ‘Meltdown’ and ‘Spectre’, the vulnerability involves malicious code utilizing a new method of side-channel analysis and running locally on a normally operating platform has the potential to allow the inference of data values from memory.
Intel has developed and is rapidly issuing updates for all types of Intel-based computer systems — including personal computers and servers — that render these systems immune from both exploits. Intel and its partners have made significant progress in deploying updates as both software patches and firmware updates.
BIOS IT is committed to delivering the best performance systems on the market and will continue to bring you recommended patches and updates as they are made available.
For more information or advise, please contact your BIOS IT sales representative.
Not what you're looking for? Check out our archives for more content