FUJITSU SUPPORT INFORMATION - File description: FileDesc_1291639 - PRIMERGY TX1320 M3
 

SUPPORT INFORMATION

File description
Flash - BIOS
PRIMERGY TX1320 M3 
Date: 05/02/2024
 
D3373-B1x - Admin package - Compressed Flash Files
 
 
File
FTS_D3373-B1x - Admin package - Compressed Flash Files_V5.0.0.11 - R1.37.0_1291639.ZIP
 
Version (Date)
V5.0.0.11 - R1.37.0 (16/11/2023)
 
Size:
22.59 MB
 
Language
Supports all languages
 
Status
Released for  Released for 
 
Manufacturer
Fujitsu Technology Solutions
 
MD5
EC4AD976229CEB98A6F14D94A9697EFF
 
SHA256
38D1F3B46034D52D2D120BAFB0D817AB54580A5D400A29EFD493F22B8012EB6F
 
Legal Document
D3373-B1x - Open Source License Information for Admin package V5.0.0.11 - R1.37.0
 
Installation description


This BIOS Admin
package contains at least the UEFI BIOS update files used together with the
FreeDOS operating system. Depending on the type of system it may optionally
also contain the UEFI BIOS update files used together with the Microsoft
Windows or Linux operating system.

The FreeDOS operating system is not included in this package. If necessary you
can create bootable FreeDOS USB Flash Drive, using one of the links below.

Bios
Update via Microsoft Windows / Linux:



  • Please
    refer to Download-Section Flash BIOS <System> (ASP for
    Windows/Linux)

Bios Update via
FreeDOS:



Extract all files of the downloaded BIOS Admin package to a bootable FreeDOS
update media (e.g. Hard Disk, USB Flash Drive, PXE Boot Image, etc.).

Information: You may extract the content of multiple BIOS Admin packages
(different systems) to a single update media. The update process will then
automatically find the update files matching to your system.

Once you have prepared your FreeDOS update media, you can execute the
following steps to update your UEFI BIOS:



  • Connect
    your update media to the system

  • Start the
    system and boot FreeDOS from your update media

  • Execute
    “cd dos“ at the command prompt, to change to the “DOS“
    directory


  • Execute
    “dosflash.bat“ to start the UEFI BIOS update process


  • Follow the
    instructions on the video screen and wait until the update process has
    finished


Create
a bootable FreeDOS USB Flash Drive:











WARNING:



ALL DATA STORED ON THE MEMORY STICK WILL BE ERASED PERMANENTLY !!!



PLEASE ENSURE ALL DATA IS PROPERLY BACKED-UP !!!





Please select the following link to make your USB stick bootable with Free DOS.

http://support.ts.fujitsu.com/Download/ShowDescription.asp?SoftwareGUID=4C7EAC35-E4B9-4EB2-B51D-C7AB265A9690&Info=FTS



 
Comment
PRIMERGY TX1320 M3 / TX1330 M3 uEFI FW changes:
uEFI FW - V5.0.0.11 R1.37.0 for D3373-B1x
==============================================
- Security update for 2023.3 Intel Platform Update (IPU)
Vulnerability: INTEL-SA-00813:CVE-2022-43505
- Vulnerability: Addressed OpenSSL Vulnerability, CVE-2023-0464
- Solved the issue that require entering a password during Boot under the
following conditions: Set Administrator and User password
"Password on Boot" is "Disabled", "BIOS Parameter Backup" is "Enabled"
uEFI FW - V5.0.0.11 R1.36.0 for D3373-B1x
==============================================
- Security update for 2023.3 Intel Platform Update (IPU)
Vulnerability: INTEL-SA-00828(CVE-2022-40982)
(*) CPU vendor Intel has published information suggesting a performance impact
from the mitigation of this vulnerability.
Please refer to the information below to help you to decide how to handle
this vulnerability.
Product Security: https://security.ts.fujitsu.com
Advisory: ISS-IS-2023-031500
- Microcode updated CPUID 906E9 Microcode 000000F4h
- Solved the issue that restoring by "Backup and Restore BIOS Configuration"
feature fails when the file size of restore data is multiple of 256 bytes.

uEFI FW - V5.0.0.11 R1.35.0 for D3373-B1x
==============================================
- Vulnerability: Support for IPU2023.1 (Intel Platform Update).
Following CVEs are addressed. INTEL-SA-00717: CVE-2022-26837
- Vulnerability: Support for IPU2023.2 (Intel Platform Update).
Following CVEs are addressed. INTEL-SA-00807: CVE-2022-38087
- Microcode update to 000000F2h
- SPS(Server Platform Service) FW update to 04.01.04.835.0
- Vulnerability: Addressed OpenSSL Vulnerability. Following CVEs are addressed.
CVE-2023-0286, CVE-2022-4304,CVE-2023-0215, CVE-2022-4203, CVE-2023-0216,
CVE-2023-0217, CVE-2023-0401, CVE-2022-4450
- Solved the issue that restoring BIOS parameters by "Backup and Restore BIOS
configuration" function cause system hangs.
Restore itself is no problem because this occurs when powering-off the server
after restoring. And this occurs with only BIOS R1.34.0.
- Solve the issue that IRMC will not show proper information of
"TPM ownership Established" in System Board page.
- Solved the issue that Boot Options are sometimes duplicated in Boot Option
Priorities and "Boot Override".
Please note you can boot the OS from both boot option.

uEFI FW - V5.0.0.11 R1.34.0 for D3373-B1x
==============================================
- Vulnerability: Support for IPU2022.2 (Intel Platform Update).
Following CVEs are addressed.INTEL-SA-00669: CVE-2022-26074
- Vulnerability: Support for IPU2022.3 (Intel Platform Update).
Following CVEs are addressed.INTEL-SA-00610: CVE-2022-29466
- Addressed RingHopper / VU#434994/ CVE-2021-33164
(*) after addressing this vulnerability by updating to R1.34, Windows VSM
function might not work.
If VSM function is used, please update BIOS to R1.35 or newer.
- SPS(Server Platform Service) FW update to 04.01.04.700.0
- Updated Certificate for Secure Boot Key. If you are using PK/KEK/DB/DBX
variables inside of BIOS for Secure Boot, please update to this BIOS version
and remove registered keys from "Secure Boot Configuration" of BIOS setup
menu, then register BIOS built-in default keys.
- Solved the issue that option names in help message don't match actual option
names of "USB Port Security".
- Solved the issue that after the system does not boot from "NextBootDevice"
to be set via Fujitsu iRMC REST Client Tool.
- Fixed the condition of "Password on Boot" can be selected.
before:Setting "Adimin Password",after:Setting "User Password"
- Fixed the issue that Fw/Oprom version of Intel Lan cards may incorrect value
or "N/A" in Network information of iRMC Web-UI. Affected cards are as below.
X540-T2, I210-T1, I350-T2, I350-T4, X550-T2, X710-DA2
- Solved the issue that "Could not resolve symbol [\_GPE.L69.D1F0],
AE_NOT Found" is logged with SLES15 SP3.
- Solved the issue that password cannot be authenticated.
uEFI FW - V5.0.0.11 R1.33.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Vulnerability: Update OpenSSL library from 1.0.2h to 1.1.1n. Following CVEs
are addressed.
CVS-2019-1551, CVE-2020-1968, CVE-2021-23840, CVE-2021-3712, CVE-2022-0778
uEFI FW - V5.0.0.11 R1.32.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Vulnerability: Support for IPU2021.2 (Intel Platform Update).
Following CVEs are addressed.
INTEL-UA-00365, INTEL-SA-00532: CVE-2021-0127 INTEL-SA-00527: CVE-2021-0092,
CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116,
CVE-2021-0117, CVE-2021-0118, CVE-2021-0156 INTEL-SA-00562: CVE-2021-0157
INTEL-SA-00470: CVE-2021-0060
- Vulnerability: Support for IPU2022.1 (Intel Platform Update).
Following CVEs are addressed.
INTEL-SA-00617: CVE-2022-21151 INTEL-SA-00614: CVE-2022-0005 INTEL-SA-00601:
CVE-2021-0154, CVE-2021-0188, CVE-2021-0189, CVE-2021-33123, CVE-2021-33124
INTEL-SA-00615: CVE-2022-21123, CVE-2022-21127, CVE-2022-21125, CVE-2022-21166
- Microcode update to 000000F0h
- SPS(Server Platform Service) FW update to 04.01.04.500.0
- Added subtitle "Secure Boot Configuration" in BIOS setup menu
uEFI FW - V5.0.0.11 R1.30.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Solved: CPU temperature is high (but just before Warning temperature) in
iRMC Web-UI (Sensors-Temperature). As a result, FAN spins at high speed.
This occurs with only BIOS R1.29.0.
uEFI FW - V5.0.0.11 R1.29.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Vulnerability: Support for IPU2021.1 (Intel Platform Update).
(INTEL-SA-00463:CVE-2020-12357, CVE-2020-8670, INTEL-TA-00464:CVE-2020-24512)
- Solved the issue that "DMAR: [Firmware Bug]: No firmware reserved region can
cover this RMRR" is logged at Linux OS boot.
- Update LSI RAID Driver to 06010A00
- Vulnerability: Fixed CVE-2019-14575 related to EDK II
- Vulnerability: Fixed CVE-2021-23841 related to OpenSSL
- Improvement so that OS can collect crash dump by issuing NMI when Memory
Uncorrectable Error or PCI Uncorrectable Error occurred.
- (This is already fixed with R1.28.0) Solved the issue that CD media sometimes
disappears from bot option with Soft-RAID configuration.
uEFI FW - V5.0.0.11 R1.28.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Integration of Intel QSR 2020.2. Update
(CVE-2020-8696, CVE-2020-8694, CVE-2020-8695, CVE-2020-8705)
-Solved: Vulnerability: OpenSSL Vulnerability (CVE-2020-1971)
- eLCM based OS installation ends up in BSPBR - reboot loop.
Added BSPBR Backup/Restore retry at max. 3 times to solve the issue.
[Rollout from RX2540M2](SA233686525)
-Solved: BIOS hangs with blue screen and POST code AB
after HDD recognition failed with Soft-RAID.(SA233704415)
-When DVD Boot media is attached in AVR and if every boot
options are disabled, OS is still able to boot.(SA233716607)
-RX1330M3 + RHEL 7.5 often freeze, and NMI cannot work.
Once unexpected reboot which cannot initialize CPU register is
occurred, BIOS will reset the system to clear the system.(SA233692678)
-Network Stack setting is not restored via SNTCI because this is excluded
from backup/restore. Added to backup/restore target.
[Rollout from RX1330M2] (SA233725375)

uEFI FW - V5.0.0.11 R1.27.0 for D3373-B1x
==============================================
Changes and problems fixed:
-BIOS settings may not be remained after replacement of system board
with old BIOS revision.
Fixed to ensure restoring between old and new BIOS revisions successfully.
(SA233717720, QH200807-001)

uEFI FW - V5.0.0.11 R1.26.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Integration of Intel QSR 2020.1. Update
(CVE-2020-0594, CVE-2020-0595, CVE-2020-0586, CVE-2020-0542, CVE-2020-0596,
CVE-2020-0538, CVE-2020-0534, CVE-2020-0533, CVE-2020-0566, CVE-2020-0532,
CVE-2020-0541, CVE-2020-0597, CVE-2020-0531, CVE-2020-0535, CVE-2020-0540,
CVE-2020-0536, CVE-2020-0537, CVE-2020-0545, CVE-2020-8674, CVE-2020-0539,
CVE-2020-0543, CVE-2020-0528, CVE-2020-0529, CVE-2020-0548, CVE-2020-0549)

-Remove the microcode of CPUID:506E8 which CPU is not needed to be supported.

uEFI FW - V5.0.0.11 R1.25.0 for D3373-B1x
==============================================
Changes and problems fixed:
-Vulnerability: Support for Intel IPU 2019.2 Q4 Taxi.
(CVE-2019-11157,CVE-2019-14607)
Update uCode from 000000C6h to 000000CAh.
-Solved :Though the PCI slot status was changed to Enabled from Failed,
the PCI error still occurred at POST. (potential issue)
-Solved: Keyboard is not working when booting DOS or PXE in Legacy mode.
-Solved: New boot entries are added when activating PXE Boot Option Retry.
(potential issue)
-Minor bug fix

uEFI FW - V5.0.0.11 R1.24.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Integration of Intel QSR 2019.2 update
CVE-2019-0117,CVE-2019-0123,CVE-2019-0124,CVE-2019-0169,CVE-2019-11132,
CVE-2019-11147,CVE-2019-11105,CVE-2019-11088,CVE-2019-11131,CVE-2019-11104,
CVE-2019-11097,CVE-2019-11103,CVE-2019-0131,CVE-2019-11090,CVE-2019-0165,
CVE-2019-0166,CVE-2019-0168,CVE-2019-11087,CVE-2019-11101,CVE-2019-11100,
CVE-2019-11102,CVE-2019-11106,CVE-2019-11107,CVE-2019-11109,CVE-2019-11110,
CVE-2019-11086,CVE-2019-11108,CVE-2019-0185,CVE-2019-0154
- Minor bug FIX.

uEFI FW - V5.0.0.11 R1.23.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Updated CPU Microcode to Kabylake B0 ID 000000B4h
- Integration of Intel QSR 2019.1 update (CVE-2019-0086, CVE-2019-0089,
CVE-2019-0090, CVE-2019-0091, CVE-2019-0092, CVE-2019-0093, CVE-2019-0094,
CVE-2019-0096, CVE-2019-0097, CVE-2019-0098, CVE-2019-0099, CVE-2019-0153,
CVE-2019-0170, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130)
- Integration of fix for Intel Transactional Synchronization Extensions (TSX)
Memory Ordering Issue
- Fixed a BSOD occurreance when installing Windows Server 2012 with Fujitsu
Server
View Installation Manager

uEFI FW - V5.0.0.11 R1.22.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Support of Windows Server 2019

uEFI FW - V5.0.0.11 R1.21.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Fixed a problem of "SNTCI restore failed" messages in System Event Log
- Fixed an issue that led to random occurences of POST message
"POST - No memory installed" during system startup
- Fixed doubled boot options with RedHat 7.5 installed in UEFI mode
- Restored uEFI FW switch "ASPM support" functionality
- Intel DCI Policy Update included (CVE-2018-3652)
- Added reporting of Intel SPS firmware version to "System Information Page"
uEFI FW - V5.0.0.11 R1.19.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Fixed Side-Channel Analysis Method Vulnerability
(CVE-2018-3639, CVE-2018-3640, INTEL SA-00115)

uEFI FW - V5.0.0.11 R1.18.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Fixed an issue with incorrect system time change due to Daylight Saving
- Restored HDD hot plug functionality in AHCI mode
- Component information for QLogic QL45212 is now displayed in iRMC network
inventory

uEFI FW - V5.0.0.11 R1.17.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Update to Intel Kabylake Microcode ID 00000084h
- Fix for side-channel analysis security flaws - known as
Spectre & Meltdown
Resolved issues:
- OS-Boot is possible with additional RDIMM in different channel
- A NVRAM variable could no longer be changed, after a delete operation
was executed once, on this variable.
- Special keys, like arrows or function key are not working from remote,
with serial console redirection.
- Removed an obsolete warning message at the BIOS Setup Secure Boot screen,
if the Compatibility Support Module (CSM) is disabled.
- Corrupted Secure Boot BIOS Setup screen.
- Setting the BIOS defaults while OS runtime via GABI, lead to an error
message.
- After normal DOS BIOS update all BIOS Setup settings are set to default
values
- 'POST - BIOS flash update failed' message appear in POST
New features:
- Report the PCIe slot number instead of the PFA for PCIe Root Port errors
- Report TPM FW revision in BIOS setup
- Enable Hot-plug for each SATA port, to allow LSI Software RAID
(Setup default)
- Remove AFU Flash Support
- AHCI Hotplug: Enable SATA AHCI hotplug unconditionaly

uEFI FW - V5.0.0.11 R1.13.0 for D3373-B1x
==============================================
Changes and problems fixed:
- Resolved an issue with Nvidia NVS315 only displaying a black screen after
an uEFI FW update was performed

uEFI FW - V5.0.0.11 R1.11.0 for D3373-B1x
==============================================
Changes and Problems fixed:
- Support for TPM 1.2 and TPM 2.0 modules
- Resolved an issue with TPM hardware logging non-recoverable errors
(EventID 15) in Windows System Event Log
- Resolved issue that Bitlocker fails with an internal error when TPM 2.0
module is used with Windows Server 2016
- Resolved wrong behavior that the boot device order is changed after uEFI
FW defaults were loaded

uEFI FW - V5.0.0.11 R1.5.0 for D3373-B1x
==============================================
Changes and Problems fixed:
- RESTful API feature is enabled
- Update to Intel Kabylake Microcode ID 0000005Eh fixing the Intel Hyper-
Threading bug with Kabylake processors
- Resolved an issue with Nvidia NVS315 GPU causing PCIe SERR error messages
being logged into iRMC SEL when Windows Server 2016 is installed
- Resolved issue that BSPBR (BIOS Single Parameter Backup / Restore) sets
a wrong uEFI FW password

uEFI FW - V5.0.0.11 R1.3.0 for D3373-B1x
==============================================
- Initial Release
 
 
Used in the following products
PRIMERGY TX1320 M3
  PRIMERGY TX1330 M3
  

CONTACT
Fujitsu Technology Solutions GmbH
Mies-van-der-Rohe-Strasse 8
80807 Muenchen
Germany
Website: www.fujitsu.com/fts/
All rights reserved, including intellectual property rights. Changes to technical data reserved. Delivery subject to availability.
Any liability that the data and illustrations are complete, actual or correct is excluded.
Designations may be trademarks and/or copyrights of the respective manufacturer, the use of which by third parties for their own purposes may infringe the rights of such owner.
For further information see www.fujitsu.com/fts/resources/navigation/terms-of-use.html
Copyright © Fujitsu Technology Solutions 2024