<?xml version="1.0" encoding="UTF-8"?>
<manifest schema_version="2.0.0.0">
  <revision_history>
    <product_version>
      <id product="eb66fafd28ff4c39a42b91395104bd05" version="dad40842042d45028bed80b1498765ec" lucid_version="qla2xxx.sles15.x86_64@10.02.11.00-k1(b)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.11.00-k1" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>

<p>This Driver is FIPs enabled.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This Driver is FIPs enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.02.11.00-k1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b59071ade4f9427093d3054145f8756e" version="4f587466b5da462aa6500737f8262341" lucid_version="Apollo_2000_Gen10.Lin@1.00(D)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.00" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support FIPS mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.00 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update build environment with SHA384</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="500c2e8334cb4bd793078241d6489395" version="74056d14d12d41889afa8c569d484861" lucid_version="naples-rome-milan.win.x64@6.2.26.720__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="6.2.26.720" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>AMD EPYC DRTM Boot Driver update</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.6.20.2305" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Driver update</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3f71b29f23c14fcb8f1f4cc9ac53400c" version="ed17f8156a9b4173a1ea70a0f0646dd9" lucid_version="MB008000JWRTD_x64@HPD2(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4cc24985bf9c485084dcadb54a29cb28" version="935f6a5e518b455ab8439072a24d9cde" lucid_version="VK000480GWSXF_VK000960GWSXH_VK001920GWSXK_x64@HPG3(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d4e991bf139c45c8a6f5a9b30e1a9d04" version="df981fd598ab49c7a7c8039c401fea30" lucid_version="U50.Linux@2.00_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.<br />
This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel&#39;s mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.&nbsp; This issue is not unique to HPE servers.<br />
Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.<br />
Addressed an issue where NVME hot plug when installing fully loaded NVME drives.<br />
Addressed a potential security vulnerability in some 3rd and 4th Generation Intel&reg; Xeon&reg; Processors when using Intel&reg; Software Guard Extensions (SGX) or Intel&reg; Trust Domain Extensions (TDX) may allow escalation of privilege, as documented in CVE-2023-22655.<br />
Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.<br />
Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.<br />
Addressed an issue where the iSCSI SW ipv6 HDD could not be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address Type.<br />
Addressed an issue where setup options of the BIOS Configuration (RBSU) utility may not be synchronized to the latest state when a server is idle in RBSU for more than 30 minutes.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.</p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.</p><p>Addressed an issue where NVME hot plug when installing fully loaded NVME drives.</p><p>Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.</p><p>Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.</p><p>Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt > select Network device > IP Address Type.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d905350ec9f94f94adf8077625981965" version="b4d759da74e94e1f9b499008af6c3fff" lucid_version="MB1000GVYZE_MB2000GVYZF_MB3000GVYZH_x64@HPG5__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="896ea0712e9c4853949ccb47860e6c63" version="0cd28b410203499e8bcf9f86c94afdf8" lucid_version="EO000400JWDKP_EO000800JWDKQ_EO001600JWDKR_x64@HPD2(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="11a6992c4ec7430e9b4f2b44f5d06fe1" version="1de462abc3824b908d762dc7eb41d4af" lucid_version="bnxtnet.vmware70@2024.03.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.11.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product enhances to added support for ens queue-stats multi-queue.</li>
	<li>This product enhances Update Driver logging as more generic.</li>
	<li>This product enhances to ENS driver to avoid blocking calls.</li>
	<li>This product enhances the Collection of Firmware debugging data in different scenarios.</li>
	<li>This product enhances to enable software/stack checksum calculation.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue where Fixed PSOD for rx-ring size less than 256 use case.</li>
	<li>This product corrects an issue where Fixed checksum issues for tunnel packets in ENS mode.</li>
	<li>This product corrects an issue where Fix VXLAN tunnel port config failure during driver reload.</li>
	<li>This product corrects the issue where Failing to bring up maximum number of VFs.</li>
	<li>This product corrects an issue where Fix Invalid memory access when DCB （Data Center Bridging） access alloc fails during driver load.</li>
	<li>This product corrects an issue where Fix BFD （Bidirectional Forwarding Detection）control failures in NSX environment.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bce1dc60182942cc938b19de857de7fd" version="9f41f0953e68475ea68d9aa9b162184c" lucid_version="D3000.fwsc.win_x64@5.04(H)__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.04" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v234600/20-D3000-Gen10RN504G_ED7.html">&nbsp;<u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.04 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v202692/20-D3000-Gen10RN504C_ED3.html">&nbsp;<u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eb361011be5348dc81ccf25ec5c94210" version="fa601ff4db444e778050bb47a83b4fbf" lucid_version="igb.rhel8@6.14.16-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="6.14.16-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 8.8.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.14.16-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 8.8.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="953566d3c1ab4efe9b762b361100a259" version="4412e3e7c98649b3bd32cc53ac661f12" lucid_version="FWPKG_MO001600KZYWU_MO003200KZYXB_MO006400KZYXC@HPK5__fwpkg-drive_en"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware provides bug fixes for the P5620/P5520.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b57ffa2f7fe942a89e589fe3043c5ffa" version="7be6d467034945c19f3518f7b7ee4c51" lucid_version="Gen9_EXP.win@5.15(B)__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.15" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Add support of new flash on the latest expander board.</li>
	<li>Provided a proper downgrade restriction to ensure firmware compatibility with the latest flashes.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.15" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Add support of new flash on the latest expander board.</li>
	<li>Provided a proper downgrade restriction to ensure firmware compatibility with the latest flashes.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="adbad9f6664545a48fbb137f9046902a" version="4c89ff1f76cc46a4aef0032e3d4cd08e" lucid_version="qlogic_windows_smartsan_enablement.w2k22.x64@1.0.0.1(e)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.0.1" revision="e" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.1 (d)" revision="d" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f12cb892007944f694736d03ec00543c" version="14212f4c539e4670a82480f673c0a128" lucid_version="VO000800JWZJP_VO001600JWZJQ_VO003200JWZJR_x64@HPD5(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d8cf5e47a4564ba6bcb2ea1177a33ff1" version="e0075fbf5f8a4c2191f9a125367aacd3" lucid_version="U46.fwpkg@2.00_03-06-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_03-06-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.<br />
This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel&#39;s mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.&nbsp; This issue is not unique to HPE servers.<br />
Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.<br />
Addressed an issue where NVME hot plug when installing fully loaded NVME drives.<br />
Addressed a potential security vulnerability in some 3rd and 4th Generation Intel&reg; Xeon&reg; Processors when using Intel&reg; Software Guard Extensions (SGX) or Intel&reg; Trust Domain Extensions (TDX) may allow escalation of privilege, as documented in CVE-2023-22655.<br />
Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.<br />
Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.<br />
Addressed an issue where the iSCSI SW ipv6 HDD could not be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address Type.<br />
Addressed an issue where setup options of the BIOS Configuration (RBSU) utility may not be synchronized to the latest state when a server is idle in RBSU for more than 30 minutes.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00_03-06-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.</p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.</p><p>Addressed an issue where NVME hot plug when installing fully loaded NVME drives.</p><p>Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.</p><p>Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.</p><p>Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when iSCSI IP Address Type option is set to “Auto” in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt > select Network device > IP Address Type.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="862d36dd920c478ca6dcfdb5f392893a" version="01bef79d813d4e4aad251387d2fa005d" lucid_version="MB008000GWWQU_MB006000GWWQT_x64@HPG8(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize thermal&nbsp;maximum continuous operation temperature values</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fee6e5ef12074571bae786cf87c0e11d" version="f93d52764f4a428baf36f7f1d8b40753" lucid_version="VK000240GWSRQ_VK000480GWSRR_VK000960GWSRT_ESXi@HPG4(E)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="39cff1d9c55641a8a5495e9c755fc456" version="25fc2c9adbce44128a038360b2af2943" lucid_version="FWPKG_MO001600PZWSH_MO003200PZWSK@HPD3-rev1__fwpkg-drive_en"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>It has fix code for V6 read disturb and other issues.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00136659en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>It has fix code for V6 read disturb and other issues</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5bfad4d210f242bd90a5c8fa29d29f05" version="4ff1e66c0650464d94530b0ed808442f" lucid_version="VO001920KWVMT_VO003840KWVMU_VO007680KWVMV_x64@HPK3(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="539ed4e104fc49caac711d8c4da1d36a" version="74381bae98794ea1a1dd4f60c3959ccd" lucid_version="VK000240GWCFD_VK000480GWCFE_VK000960GWCFF_x64@HPG3(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eb650e36c9b84eb1b7c6c75d7ff3e9f2" version="f49325203a824041a7fbc4bd0b95415b" lucid_version="MB004000JWWQB_MB002000JWWQA_x64@HPD8(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="696ee1f3634445c49a160d3bc3772307" version="8ffeb76054c941eb9a65965938f6fed0" lucid_version="EG0600JETKA_EG0900JETKB_EG1200JETKC_x64@HPD8(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dffb1787348c4681b9170fbc360355c9" version="6344e18bc7e843a4945d1edd93a086bf" lucid_version="MB4000JEQNL_MB6000JEQNN_ESXi@HPDB(K)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDB (K)" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2eef2276e4ef4f45a356ace7c4982af7" version="101c363c266e424193cbb632ae9a2bd3" lucid_version="qla2xxx.rhel8.x86_64_legacy@10.02.11.00-k1(b)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.11.00-k1" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>

<p>This&nbsp;Driver is FIPs enabled.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This&nbsp;Driver is FIPs enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.02.11.00-k1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b61013381e514e74835819b0f29c6165" version="3f9f6c813e3443288606b792a67580ef" lucid_version="MB012000JZYVN_MB014000JZYVP_MB016000JZYVQ_x64@HPD4__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves performance in certain file systems and implements fixes for several of the previous firmware&rsquo;s shortcomings.</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in certain error and timing conditions.</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves data integrity</li>
	<li>Decreases&nbsp;possibility of data corruption in certain error and timing conditions</li>
	<li>Reduces the probability of hangs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="871bd1fc79994166a0695e4fb3b5fd65" version="6801a4dd324e4d7996ccbc1a4f47a6d3" lucid_version="A46.Linux@3.00_01-26-2024(B)__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 3.00_01-26-2024.</p>

<p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors. This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors. This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers. This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575. This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>&nbsp;</p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p>

<p>&nbsp;</p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_01-26-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.



This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.



This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.



This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.



This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p><p></p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3f4d9eceae63421389745abdf06f001a" version="dc6baf07fbc2498fbb051e94b63a1a9d" lucid_version="FWPKG-P31348-B21@20.40.1000__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.40.1000" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>No New features or changes have been included in version 20.40.1000.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.40.1000:</strong></p>

<ul>
	<li>RDE LLDPTransmit ChassisID was occassionally not represented correctly.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="20.39.1002" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p><strong>New features and changes included in version 20.39.1002:</strong></p>

<ul>
	<li>Get Temperature OEM command now always returns a unified temperature.</li>
	<li>Enabled Management Component Transport Protocol (MCTP) over PCIe.</li>
	<li>Added a caching mechanism to improved expansion ROM performance and to avoid any slow boot occurrences when loading the expansion ROM driver.</li>
	<li>Added new support for reserved mkey index range. When enabled, a range of mkey indexes is reserved for mkey by name use.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No new fixes have been included in version 20.39.1002.</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8dad994cacb24e87b613f12e36f4c8c5" version="ecf8cab070b24650ba98c6d26cb25ed0" lucid_version="Shenandoah.win2016.x64@7.716.3.0(D)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="7.716.3.0" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support SHA384</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.716.3.0 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support SHA384</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d93273aa12774694887dc3aab21ae996" version="718d817204064206ad220c1477d00dba" lucid_version="qedentv.vmware80@2024.03.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which fixed PSOD that keep DRSS module parameter disabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.12.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of combo image version v8.65.09.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0f3487315f10473a903e3c353d754526" version="3e186cc8e7104aa1b447e42218ed8a8c" lucid_version="rocketlake.win.x64@10.1.18807.8279(C)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.1.18807.8279" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.1.18807.8279 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for HPE ProLiant MicroServer Gen10 Plus v2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="52c884546e0a44fb8cddfd654ad71e81" version="49923a9b396a4e7baa2c72f23321db85" lucid_version="U60.Linux@2.00_02-01-2024__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p>Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI ASPM to Disabled/L1 Enabled.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Added "DMI Power Management (ASPM)" option in RBSU. The option has the default value of "disable", which will override default setting of "enable" from the previous ROM. This is due to enabling DMI power management might result in system hang with machine check exception based on Intel erratum RKL-15.</p><p>The path to the option is: Processor Options -> DMI Power Management (ASPM)</p><p></p><p>This setting has the Redfish property URI of: /redfish/v1/systems/1/bios/settings/E3DmiAspm</p><p></p><p>To follow DMTF schema, change the Redfish registry version naming to have the pattern of "^\d+.\d+.\d+$".</p><p>For example, /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will now becomes /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.4 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2023-23583. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.1.1v update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="707f07cb4d404d119f2788d168e17586" version="76130914f2014d558ae17982e946d0ef" lucid_version="a43.win.x64@3.00_01-26-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.

This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.

This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.

This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-27-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.



This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision provides AMD's mitigation for security vulnerabilities for CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="920be7efa67449a4b47e25f2db58a48e" version="e3290a1cb7df4e24a73fd86c590b9873" lucid_version="VK000960GXCLD_VK001920GXCGP_VK003840GXCGQ_x64@HPG3(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="03d55b6f216746b88ddef311b0a8c1f9" version="077bd1734fab4946b5cf55e0a5002671" lucid_version="nicfwupg_qlnx2.vmware@1.34.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.34.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.33.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with drivers</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b2d8d2ad18164775b6ab15fb40652791" version="f144790b9ac0456483654c02bac14946" lucid_version="MB4000JEQNL_MB6000JEQNN_x64@HPDB(I)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDB (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3a33d0d2b6ca440681703cda5e638a33" version="0d326b6f80594a258f59bc341eaad4dd" lucid_version="VK000240GWEZB_VK000480GWEZC_VK000960GWEZD_VK0_ESXi@HPGG(D)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGG" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGG (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0a8a267d13ac4d5588a19d1f0bcc2f5d" version="b6a079100615409a9387643c0d0ae5d3" lucid_version="FWPKG-P13188-B21@16.35.3006(A)__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="16.35.3006" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Important : Security Hardening Enhancements - This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device firmware to this version to improve the firmware security and reliability of your device.</p>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 16.35.3006(A):</strong></p>

<ul>
	<li>Component rebuilt to set the &#39;ResetRequired&#39;, &#39;SysPowerON&#39; parameter values to &#39;true&#39; in the included payload.json file. This will help SUM categorize the component appropriately for deployment in SPP, and display the correct user prompt after firmware component execution.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="16.35.3006" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Important : Security Hardening Enhancements - This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device firmware to this version to improve the firmware security and reliability of your device.</p>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4899e6b54e3941a4b9c3090a539cf6db" version="62cc5e5aa93549218f51cfbfb5b52603" lucid_version="Gen10P_Gen11_Storcli-sut.esxi80@2023.12.01-rev1__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.12.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Support autoconfig command.</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<strong><em>storcli /cx set autoconfig = &lt; none | JBOD &gt;</em></strong></p>

<ul>
	<li>Added a new option [ReuseTargetId] to add vd command. If &quot;ReuseTargetId&quot; is mentioned in the add vd command, the FW will allow reusing of TargetIDs without 120 seconds delay.</li>
	<li>Added support for UBM7 backplanes.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.12.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>New release for version 007.2613.0000.0000.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="35452d3049b54455b15816bf1978a61f" version="252464ed6289420b8b9f65d8eee00deb" lucid_version="MB014000JXUCC_ESXi@HPD4__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed&nbsp;issue of self-initiated resetting of drives under queue full handling situations</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d626b04e2b74450287a682c2c77ab027" version="92a7f2e63e074b11a39148b218518614" lucid_version="MLNX_IB_Only_CX4_CX5_HCA_FW_package.x64@1.0.0.13__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.13" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)<br />
	&nbsp;</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 16.35.3006:</strong></p>

<ul>
	<li>872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)</li>
	<li>872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 12.28.2006:</strong></p>

<ul>
	<li>Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an&nbsp;issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.12" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)<br />
	&nbsp;</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 16.35.1012:</strong></p>

<ul>
	<li>872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)</li>
	<li>872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>New features and changes included in version 16.35.1012:</strong></p>

<ul>
	<li>Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.<br />
	Note: If the Keep Link Up NV configuration is changed, phyless reset will be blocked.</li>
	<li>Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.</li>
	<li>Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.</li>
	<li>Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.</li>
	<li>Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.</li>
	<li>Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.</li>
	<li>Disabled the option to send SMPs from unauthorized hosts.</li>
	<li>Enabled the option to modify the ip_ecn field in the packet header in firmware steering.</li>
	<li>Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.</li>
	<li>Modified the maximum bulk size per single allocation from &quot;log_table_size - log_num_unisizes&quot;, to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.</li>
	<li>Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 12.28.2006:</strong></p>

<ul>
	<li>Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an&nbsp;issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.1012</strong></p>

<ul>
	<li>Rare lanes skew issue that caused CPU to timeout in Rec.idle.</li>
	<li>The card occasionally masked some PCIe AER reporting.</li>
	<li>Incorrect flow of credits blockage that prevented booting during DC cycle test.</li>
	<li>An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c165fa12d9644f82b813c7e585ce9181" version="5a9fb5b44fa94a6d9babe7b90cfccaf1" lucid_version="DL20GEN10Plus_ME.linux@06.00.03.604__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="06.00.03.604" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/01/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2024.1 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="06.00.03.505" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2a7080d78048494dac265180eef80ae1" version="92d85d1ca11d4a4d8577fc5ce06f6053" lucid_version="EG000300JWBHR_ESXi@HPD5(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="40aca5b1425544eabf3dc630ea9b775f" version="7801879ce85e418a8ed0142001bdd1b5" lucid_version="emulex.fc.fw.esxi70_rt@2023.10.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.19</td>
			<td>14.2.589.19</td>
			<td>14.2.589.16</td>
			<td>14.2.566.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.19</td>
			<td>14.2.589.19</td>
			<td>14.2.589.16</td>
			<td>14.2.566.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.5</td>
			<td>14.2.589.5</td>
			<td>14.2.579.0</td>
			<td>14.2.566.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.5</td>
			<td>14.2.589.5</td>
			<td>14.2.579.0</td>
			<td>14.2.566.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9f8f92dcaee7444992d11c0fa284d349" version="878f45f962114d59ae557f807bd15c0d" lucid_version="netxtreme2.rhel8@7.15.17-7__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="7.15.17-7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product enhanced the compatibility with Linux firmware component 2.34.0.</li>
	<li>This product now supported for Red Hat Enterprise Linux 8 update 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.15.17-1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supported for Red Hat Enterprise Linux 8.8</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="15b8ab8f16cc44ddb79fc673833826dc" version="a24ae8365a354be68bc9d06e0009ca64" lucid_version="MB006000GWBXQ_MB008000GWBYL_x64@HPG8(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2ed4fb56e81f45b0b8ae601a61b78e6c" version="66d1ff8c44bf49b4ab47da047112ff47" lucid_version="bnxt.sles15@1.10.2-228.0.133.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.10.2-228.0.133.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.10.2-227.0.130.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product allowed GPU direct DKMS package to skip building peermem module if support already exists in kernel.</li>
	<li>This product now supported rdma driver version query from ipmi interface.</li>
	<li>This product now enabled XPS by default on driver load.</li>
	<li>This product added support for SUSE Linux Enterprise Server 15 SP5.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed an issue that DKMS RPM packages failing to build driver.</li>
	<li>This product fixed an issue that driver and tools DKMS package unable to run POST_INSTALL script.</li>
	<li>This product fixed a hang or crash issue when running ntuple scaling tests.</li>
	<li>This product fixed a kernel panic issue when PHC UPDATE async event comes.</li>
	<li>This product fixed an kernel crash issue when SRIOV is disabled while PF is being moved from switchdev to legacy back and forth in a loop and also while set channels (ring number change) is run in a loop.</li>
	<li>This product fixed HOT Reset Timout in scaled up incremental flows.</li>
	<li>This product fixed an issue that port stop/start all in a loop triggers memory corruptions after couple of hundred iterations.</li>
	<li>This product fixed a host crash issue when adding/deleting filters with traffic.</li>
	<li>This product fixed an issue that kernel throws WARN as firmware coredump lengths differs.</li>
	<li>This product fixed a host crash issue on null pointer firmware crash when filters are being added on another host.</li>
	<li>This product fixed a system crashed issue after enabling RDMA followed by firmware reset and L2 driver unload.</li>
	<li>This product fixed warnings observed while compiling bnxt_re driver on kernel.</li>
	<li>This product fixed a system crash issue observed while running self-test on port 1 when LAG is configured.</li>
	<li>This product fixed a driver crash issue after exiting XDP mode.</li>
	<li>This product fixed a crash issue when processing PTP packets on NPAR functions.</li>
	<li>This product fixed a system crash issue while binding PF back to bnxt_en after binding it to vfio-pci and launching testpmd.</li>
	<li>This product fixed a possible SKB out-of-bounds access.</li>
	<li>This product fixed a crash issue observed while running the ethtool command while unloading the driver.</li>
	<li>This product fixed VF resource limits issue.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d1f6d486a5d9456eb4b15539009012ca" version="e2fcf95c2e0649c4957693c891da827b" lucid_version="MLNX_Open_Ethernet_NIC_MFT_FW_package.esxi70@1.0.7__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)</li>
	<li>P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>Firmware for the following device&nbsp;has been updated to 16.35.3006:</strong></p>

<ul>
	<li>P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.<br />
	&nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.<br />
	&nbsp;</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)</li>
	<li>P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>Firmware for the following device&nbsp;has been updated to 16.35.1012:</strong></p>

<ul>
	<li>P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.<br />
	&nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.1012:</strong></p>

<ul>
	<li>Added support for copy modify header steering action to/from the UDP field.</li>
	<li>Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.</li>
	<li>QoS priority trust default state can now be changed using the new nvconfig below:
	<ul>
		<li>QOS_TRUST_STATE_P1</li>
		<li>QOS_TRUST_STATE_P2</li>
	</ul>
	</li>
</ul>

<p style="margin-left:40px">The values that can be used to set the default state are:</p>

<ul style="margin-left:40px">
	<li>TRUST_PORT</li>
	<li>TRUST_PCP</li>
	<li>TRUST_DSCP</li>
	<li>TRUST_DSCP_PCP</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.<br />
	&nbsp;</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.1012:</strong></p>

<ul>
	<li>RDE (Redfish) PATCH operation to LLDPTransmit properties &quot;ManagementAddressIPv4&quot;, &quot;ManagementAddressIPv6&quot; and &quot;ManagementAddressMAC&quot; were applied only in the first attempt, but failed in the next.</li>
	<li>PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.</li>
	<li>Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions.&nbsp;</li>
	<li>InfiniBand L2 QP could not receive RDMA traffic occasionally.</li>
	<li>Running with a debug firmware reduced security as if token was applied.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f74d68169f04405fb74a2820e48df6f5" version="3a3f0caf4f8f41a6a54eb9f1e9557aaf" lucid_version="matrox.G200eH3.win2016.x64@9.15.1.248(E)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="9.15.1.248" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.15.1.248 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added Supported Platforms tag</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="283d84a861d348648dca86da7b4218bd" version="c59e6fbcf45e45c6a70e6cb4a28ff80e" lucid_version="intel_i40ea.w2k22@1.18.367.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.18.367.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.16.208.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of FVL9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7004592a3bf74fab99a6fe756662ebbc" version="cf68b6dfbe7e4db2aa9019a6d202162e" lucid_version="VO000960JWTBK_VO001920JWTBL_VO003840JWTBN_ESXi@HPDB__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for unrecovered errors which may occur on the targeted Blocks of Wear-leveling process when host issues Read command.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e4254455513a49c0ad5f61c79ab13950" version="df1b2df00cea4e5da804c897fc8a2645" lucid_version="MB010000JWAYK_MB008000JWAYH_x64@HPD6(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d936b2fd4e0c4dcb9d5ef13b3d9dbd87" version="cf1745d1da02409bae14c46871a1a26b" lucid_version="broadcom_nxe.w2k19@228.0.121.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="228.0.121.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.0.125.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed the problem that RoCE driver failed to load with specific active firmware version.</li>
	<li>This product addressed private data retrieval for user mode RDMA connectors.</li>
	<li>This product addressed a fix for NDSPI to correctly detect the type of retransmit capability.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5c10ef42611f4cada08e038ec64fbce6" version="bc836aeeded143519b464952d3dda7c4" lucid_version="nicfwpkg_qlflq_open@8.65.09(B)__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="8.65.09" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses the issue of inconsistent metadata within the component products.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.65.09" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where BSOD is seen.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ccde97956825448f97ee8427bc2eccdb" version="75567e43c57e4ed29bf5d68f1b47763c" lucid_version="hpepqiesrv.win@1.2.1.68__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.2.1.68" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support&nbsp;SHA384</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Added new details for surface analysis</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.1.67 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support SHA384</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b88ebb63a68747808884160b11c000eb" version="a4115cfe20434efdba123bf543614b31" lucid_version="vxs.w2k19@2.1.230.0(B)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.1.230.0" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with CNSA (Commercial National Security Algorithm) compliance.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.1.230.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation library NicInVXS.dll and vxsmsg.dll.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d152e4f9638d4a6a962a3424ad625ef5" version="6e9bd804ca134737ac6d9806953e445c" lucid_version="A41.Linux@3.00_01-26-2024(B)__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 3.00_01-26-2024.</p>

<p>This version of the System ROM contains updates aligned with vulnerability fixes in EDK2 NetworkPkg IP stack implementation that is described in the address <a href="https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h">https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h</a>.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_01-26-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with vulnerability fixes in EDK2 NetworkPkg IP stack implementation that is described in the address <a href="https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h">https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h</a>.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a2d50341a55d404a82473ce007636a93" version="3ac627c260144d30b3a87bc1d2963dab" lucid_version="D8000.fwsc.linux_x64@0130(C)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="0130" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of RHEL 8.7</p>
	</li>
	<li>
	<p>Added support of RHEL 9.1&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP4</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Smart Array reporting &quot;Storage Enclosure FW upgrade Problem Detected&quot;.</li>
	<li>PSU version is showing as &quot;No Ver&quot; after inserted the New bel power PSU.</li>
	<li>GEM_5_2 Coverity defect fix.</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v234513/20-D8000-Gen10RN0130B_ED3.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0130" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of Rhel 7.8&nbsp;</p>
	</li>
	<li>
	<p>Added support of Rhel 8.2&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP2</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Smart Array reporting &quot;Storage Enclosure FW upgrade Problem Detected&quot;.</li>
	<li>PSU version is showing as &quot;No Ver&quot; after inserted the New bel power PSU.</li>
	<li>GEM_5_2 Coverity defect fix.</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v218471/20-D8000-Gen10RN0130_ED1.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5b36200ffa3640839369c39ca58c8134" version="49c8494c3c3d4fc392d6e2072b8210f4" lucid_version="FWPKG_VO000960KXNXD_VO001920KXNZQ@HPS1__fwpkg-drive_en"/>
      <revision_history>
        <revision>
          <version value="HPS1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fix issues of MCTP over I2C fix for obtaining Endpoint ID(EID), and SPDM support fix onto MCTP reply message.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5588a72e9c0d4878a499b54f0c18241c" version="39abe681c67a4965a918fccec442b24d" lucid_version="esxi70-amsd-sw-bundle-sc@2024.03.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.03.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Agentless Management Service</strong></p>

<ul>
	<li>Fixed OID name hrSystemUptime is reported incorrectly</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.07.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Agentless Management Service</strong></p>

<ul>
	<li>Extend network adapter speed support with 20,40, and 100G for CPQNIC MIB cpqNicIfPhysAdapterConfSpeedDuplex OID.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Agentless Management Service</strong></p>

<ul>
	<li>Fixed incorrect NVMe drive information displayed after hot plugging.</li>
	<li>Fixed SSD wear status sudden peak value triggering SNMP trap false alarm.</li>
	<li>Fixed incomplete uninstallation for amscli while upgrading Agentless Management Service.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f85aacf9018c4fbdadcdb2b9bbf03fed" version="04c7f3f8e61b4b8db6017922aba3ae00" lucid_version="FWPKG_VR000480KXNXE_VR000960KXNZU_VS001920KXNXF@HPK2__fwpkg-drive_en"/>
      <revision_history>
        <revision>
          <version value="HPK2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix the detection issue on wondermiddle after hot-plug</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0b3bbfed90454334ba3331c2f9efa2ea" version="96b21d8e233347c7a14f3f6589b3ebc0" lucid_version="VO000960JWZJF_VO001920JWZJH_VO003840JWZJK_ESXi@HPD5-rev2__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00136659en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="acccc3a79b934a56bc23c6e1a1b8169b" version="61d9be39e7c14913ad8a173b83e42efd" lucid_version="FWPKG_VO000960RZWUP_VO000960RZWUQ_VO001920RZWUR@HPD1__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This fix is for unrecovered errors may occur on the targeted Blocks of Wear-leveling process when host issues Read command.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f2f901fd357f4c6692fae66dcbbb15ed" version="56fc9e8296494599bba4c2c0f189c59e" lucid_version="u44.fwpkg@3.00_02-01-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.

This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 05.01.04.913.<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.</p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p>Addressed an issue where system might hang while accessing IML log from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bca5397d7ba147ddbb0eb4fee4d4d567" version="73b8d2e49ce8412fbf98435627cc135a" lucid_version="qlogic.online.fw.lin.x64_rt@2023.10.01(b)__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.01" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This component is FIPs enabled.</p>

<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR">Adapter</p>
			</td>
			<td>
			<p dir="LTR">Speed</p>
			</td>
			<td>
			<p dir="LTR">MBI</p>
			</td>
			<td>
			<p dir="LTR">Firmware</p>
			</td>
			<td>
			<p dir="LTR">UEFI</p>
			</td>
			<td>
			<p dir="LTR">Boot Bios</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.09.07</p>
			</td>
			<td>
			<p dir="LTR">09.14.01</p>
			</td>
			<td>
			<p dir="LTR">7.36</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.09.07</p>
			</td>
			<td>
			<p dir="LTR">09.14.01</p>
			</td>
			<td>
			<p dir="LTR">7.36</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.09.07</td>
			<td>09.14.01</td>
			<td>7.36</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.09.07</td>
			<td>09.14.01</td>
			<td>7.36</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This component is FIPs enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.10.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR">Adapter</p>
			</td>
			<td>
			<p dir="LTR">Speed</p>
			</td>
			<td>
			<p dir="LTR">MBI</p>
			</td>
			<td>
			<p dir="LTR">Firmware</p>
			</td>
			<td>
			<p dir="LTR">UEFI</p>
			</td>
			<td>
			<p dir="LTR">Boot Bios</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.09.07</p>
			</td>
			<td>
			<p dir="LTR">09.14.01</p>
			</td>
			<td>
			<p dir="LTR">7.36</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.09.07</p>
			</td>
			<td>
			<p dir="LTR">09.14.01</p>
			</td>
			<td>
			<p dir="LTR">7.36</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.09.07</td>
			<td>09.14.01</td>
			<td>7.36</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.09.07</td>
			<td>09.14.01</td>
			<td>7.36</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4502e15e8e6c48d58b299fb45b3d1658" version="f3e7b3de198f4b88af565b1feba61327" lucid_version="U64.fwpkg@2.00_02-01-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p>Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI ASPM to Disabled/L1 Enabled.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Added "DMI Power Management (ASPM)" option in RBSU. The option has the default value of "disable", which will override default setting of "enable" from the previous ROM. This is due to enabling DMI power management might result in system hang with machine check exception based on Intel erratum RKL-15.</p><p>The path to the option is: Processor Options -> DMI Power Management (ASPM)</p><p></p><p>This setting has the Redfish property URI of: /redfish/v1/systems/1/bios/settings/E3DmiAspm</p><p></p><p>To follow DMTF schema, change the Redfish registry version naming to have the pattern of "^\d+.\d+.\d+$".</p><p>For example, /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will now becomes /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.4 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2023-23583. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.1.1v update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c6a4f7a1c0f14173802a4263b3ee7551" version="a7eeb7b596fb4aa3a6330396829d327b" lucid_version="VK000240GWTSV_VK000480GWTTA_VK000960GWTTB_x64@HPG7(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG7" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>High Security Enablement support FIPs.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG7" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a false indication of rare capacitor test failure</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8a5f6b85a2a94dc58e5d42c516c7060a" version="8b729271442c4aacab9e55566505bd83" lucid_version="MB016000JWXKH_ESXi@HPDA-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDA" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a6447acbde7f4368991a3df1503f91e8" version="4edb91f198fd4f2d950b8b698da5648b" lucid_version="MB008000GWRTC_ESXi@HPG1(H)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3b175f364fc14c6da598ff868e4cfb48" version="688852a05e0b4034a7cd6273f43045f7" lucid_version="UBM2_FWPKG@1.20(E)__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="1.20" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>For Gen11 PR3 &amp; 2023 March MSB</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.20 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support Gen11 Intel servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="594618f566cc4fbca055e8866278e53d" version="011f0536994441d18c9f7ef41d7d5706" lucid_version="ssa.win_64@6.30.8.0__sc-windows_cn,de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="6.30.8.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>For 2024 March MSB</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.25.9.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6c76dfc1e26441a48559e0f1bee2891e" version="159c13d0977b4c038d11ee9307878c91" lucid_version="D6020.fwsc.win_x64@2.74(O)__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.74" revision="O" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v234598/20-D6020-Gen10RN274N_ED12.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.74 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v202690/20-D6020-Gen10RN274J_ED8.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1195ecfa03744617a13d6f9abdc72e2b" version="a79330dae9054b2591c4ea68c442c286" lucid_version="MB2000GFEMH_MB4000GFEMK_x64@HPG6(L)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (K)" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="474dacedc05a47e69c05eb6235e4913d" version="5b29121989c44917a1768de4777820ec" lucid_version="MB6000GVYZB_MB4000GVYZA_ESXi@HPG5(B)-rev2__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4c108242693848129dadc44c03c82865" version="5ba2fe62306d406aae00e2995213020e" lucid_version="IEGen10Plus.fwpkg@1.0.0.22(B)__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.0.22" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.0.22(B) contains updates to the firmware packaging and is functionally equivalent to ver. 1.0.0.22. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 1.0.0.22.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.22" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f7ead10dcb9d4e3b81c19da679b23ce2" version="8f833a5501b040e58404e78ebd0fbd37" lucid_version="VK000480GWSXF_VK000960GWSXH_VK001920GWSXK_ESXi@HPG3(D)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3a4168637f45404b864aa9e998210305" version="94ee8467ed4740e59eb5538ed4d8e659" lucid_version="HPE-CNA-FC-Emulex-Enablement.sles15.x86_64@14.2.589.11(b)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="14.2.589.11" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to&nbsp;version 14.2.589.11-1</p>

<p>The Enablement Kit is FIPs enabled</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The Enablement Kit is FIPs Enabled</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="14.2.589.11" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to&nbsp;version 14.2.589.11-1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="79178f63311141b49420306fd1de47d3" version="657ba76888b746059177ebbc48311a07" lucid_version="i40e.rhel8@2.23.17-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.23.17-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports PHY debug register dump by ethtool.</li>
	<li>This product now supports Red Hat Enterprise Linux 8.8.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct&nbsp;an issue where the NVM fail to update due to the improper 802.1q VLAN tag feature detection.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.23.17-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports PHY debug register dump by ethtool.</li>
	<li>This product now supports Red Hat Enterprise Linux 8.8.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct&nbsp;an issue where the NVM fail to update due to the improper 802.1q VLAN tag feature detection.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7204c0f5c514445a87ae5a6c742f6a37" version="8701a149504647ba903910b2a09a637d" lucid_version="i40e.sles15@2.23.17-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.23.17-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports PHY debug register dump by ethtool.</li>
	<li>This product now supports SUSE Linux Enterprise Server 15 SP5.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct&nbsp;an issue where the NVM fail to update due to the improper 802.1q VLAN tag feature detection.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.23.17-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports PHY debug register dump by ethtool.</li>
	<li>This product now supports SUSE Linux Enterprise Server 15 SP5.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct&nbsp;an issue where the NVM fail to update due to the improper 802.1q VLAN tag feature detection.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8be880867f274999951d42eb0e3b0aa8" version="a6c41117052347508e0def42737cc880" lucid_version="qlogic_linux_smartsan_enablement@3.3-3(p)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.3-3" revision="p" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 3.3-3</p>

<p>This Component is FIPs enabled.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This Component is FIPs enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.3-3 (o)" revision="o" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 3.3-3</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1188e33080924486b998a030d43acf6f" version="65e52de82f21422c82c2a2099f95b90c" lucid_version="i40eb.w2k22@1.18.367.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.18.367.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.16.208.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of FVL9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="968a9e036afd4092af43608fa1a5a87c" version="0d2af43c62344ed9a95e32235d19ced8" lucid_version="MB018000JXMTH_MB020000JXMTP_x64@HPD2__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Assert fixes, logging enhancements and all current firmware improvements and bug fixes.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dea19449209743ffa1d2262e07eafb25" version="9a12c5cef4aa41b3aacc9152b8f0623a" lucid_version="U33.linux@3.10_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aa3d4b3746e2485289f458134b1187cd" version="416e87e9bccd4f868aef3d745ffaf94f" lucid_version="Apollo_2000_Gen10Plus.Esxi@1.27(B)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.27" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update build environment with SHA384</li>
	<li>Update OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.27" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f66d2f40fe3b49a2ae22ce155e429f5c" version="ab8c612c7f244135a0ed1b2c7d972f55" lucid_version="MB008000JWWQP_MB006000JWWQN_x64@HPD8(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9e4dc8db386245f0ad4fc38aef31f547" version="8e6d06d1576546689f7e6744e4d8233a" lucid_version="MB1000JVYZL_MB2000JVYZN_MB3000JVYZP_ESXi@HPD3(H)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6d4e51e8b4c040cc80275ae447831403" version="21301f6b1876447b9a5ee6a20266eaa0" lucid_version="Gen10P_Gen11_StorCLI.win@7.2613.0.0-rev1__sc-windows_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="7.2613.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Support autoconfig command.</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<strong><em>storcli /cx set autoconfig = &lt; none | JBOD &gt;</em></strong></p>

<ul>
	<li>Added a new option [ReuseTargetId] to add vd command. If &quot;ReuseTargetId&quot; is mentioned in the add vd command, the FW will allow reusing of TargetIDs without 120 seconds delay.</li>
	<li>Added support for UBM7 backplanes.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.2613.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>New release for version&nbsp;7.2613.0.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a583c05eda574560bf7c625d7e1d2b1c" version="4c94f1079e68483badec0da59cc58224" lucid_version="MB2000JFDSL_MB4000JFDSN_x64@HPD4(L)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (K)" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="96d916494e7148b08fda3030539ce372" version="49775f8886c245ba90c33c5c43ec8624" lucid_version="nicfwupg_bcm.vmware_Gen10@1.37.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.37.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports GetPackageStatus NCSI Command.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.36.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The product addressed some Broadcom code structure utilization.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addressed that platform might encounter a POST failure when NX1-based controllers and some storage controllers combines.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="779f4f17fec64b6b9acf9ede668fc68a" version="0932d7da6c894095857964ae4af29e27" lucid_version="EG000300JWSJP_EG000600JWJNH_EG001200JWJNK_x64@HPD5(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6439c3485f63410da139047f5f5bc562" version="3ce41c8ac1d44bc5aa6b0c09e8e0a891" lucid_version="esxi70-ilo-drv-bundle-sc@2024.03.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addressed a memory leak in vmkernel.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for vSphere 8.0U2.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4ecda510f4cf4aef9ac80ad782d1c36e" version="b9eb2dd1e09e4ec5840c9f1045de115a" lucid_version="A41.win.x64@3.00_01-26-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with vulnerability fixes in EDK2 NetworkPkg IP stack implementation that is described in the address https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.



This revision of the System ROM includes AMD reference code NaplesPI 1.0.0.K for AMD 1st Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where Restore Manufacturing Defaults and Restore Defaults from iLO web did not restore the Secure Boot Status.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a47a2412fac54aa19a093a9d6e9724ed" version="763d85119a124d878f6d78cf97c803d2" lucid_version="MLNX_VPI_Ethernet_Infiniband_HCA_FW_package.esxi80@1.0.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="239d1dd26f2c4614bfcd9033d0a83734" version="d0abadfa916e4a4faf4ad4323ca4770e" lucid_version="EG000600JWFUV_EG001200JWFVA_ESXi@HPD4(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8e9f61780275418686c8b0a671e012c9" version="fc52a6a783504fec9a4489fd65582234" lucid_version="VK000480GZCNE_VK000960GZCNF_VK001920GZCNH_ESXi@HPG3-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improve the FW about data mismatch after SPL</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improve the FW about data mismatch after SPL</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d00882018d64492aa4a5bc81f394c4dc" version="c6804fdc31494899a46b7cabc05ed41f" lucid_version="A46.Win.x64@3.00_01-26-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.



This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.



This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.



This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.



This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p><p></p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-27-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.

This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision provides AMD's mitigation for security vulnerabilities for CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="58259b45dec7469580dfbddb76171768" version="400a5a9ee7f54a9c8526337d916d0c7a" lucid_version="ixgbevf.sles15@4.18.7-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.18.7-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;SUSE Linux Enterprise Server 15 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.18.7-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;SUSE Linux Enterprise Server 15 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c9a4232d8cb349049f544bcc6d02e97f" version="8990fa28f67f4cd1a696e4327041cea1" lucid_version="HPE_MR416i-a_Gen10P@52.26.3-5379__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="52.26.3-5379" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>7.26 Patch Release Beta Drop</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fix brick controller issue.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="52.26.3-5250" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>DMTF PLDM Redfish Device Enablement enhancements
	<ul>
		<li>iLO5 2.99, iLO6 1.54 or later versions are required.</li>
		<li>Added support for Chassis Data Model
		<ul>
			<li>GET Storage[Links][Enclosures]</li>
			<li>GET Chassis</li>
			<li>GET DriveCollection</li>
			<li>GET Drive[Status][State]=Absent (include empty bays under Chassis.)</li>
			<li>GET Drive[Links][Chassis]</li>
			<li>Note1: Drive URL will change to /redfish/v1/Chassis/{Id}/Drives/{Id}</li>
			<li>Note2: The empty bay resource ID is generated using &lt;Encl ID in upper byte&gt;:&lt;Bay Number in lower byte&gt;</li>
		</ul>
		</li>
		<li>Added support for Fabric Data Model
		<ul>
			<li>GET Fabric, SwitchCollection, Switch, PortCollection, Port</li>
		</ul>
		</li>
		<li>Added support the following Redfish Events
		<ul>
			<li>DriveMissing</li>
			<li>DriveMissingCleared</li>
			<li>DriveOffline</li>
			<li>DriveOfflineCleared</li>
			<li>VolumeOffline</li>
			<li>VolumeOfflineCleared</li>
		</ul>
		</li>
		<li>Added support for the following Redfish Annotations
		<ul>
			<li>@Redfish.AllowableValues (patch and post)</li>
			<li>@Redfish.AllowablePattern (patch and post)</li>
			<li>@Redfish.AllowableNumbers (patch and post)</li>
			<li>@Redfish.WriteableProperties (patch only)</li>
			<li>Note1: Any property not listed in the writeable properties list does not contain any other annotation.</li>
			<li>Note2: For VolumeCapabilities[@CapacityBytes.AllowableValues], the range is set from 1GiB to a maximum possible value of the RAID0 volume size considering the same type of the available &lsquo;n&rsquo; number of unconfigured drives. The CapacityBytes in the POST is not validated against the range in the VolumeCapabilities as the RAID Type and the number of drives, strip size and so on matter.</li>
		</ul>
		</li>
		<li>Added support for Redfish AutoVolumeCreate
		<ul>
			<li>GET/PATCH Storage[AutoVolumeCreate]</li>
			<li>MR200 will return AutoVolumeCreate=NonRAID, which remains the same as earlier firmware versions.</li>
			<li>MR400 will return AutoVolumeCreate=Disabled. Any newly added drive into a MR400 will no longer automatically appear as a JBOD and the user must configure the drive before using it.</li>
		</ul>
		</li>
	</ul>
	</li>
	<li>Added support for UBM7 backplanes</li>
	<li>Update to 2023.1 schema bundle</li>
	<li>Improve Copyback disable handling while copyback is in progress on drives</li>
	<li>Support new PSoC 6 part information display.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix a00133433en_us: HPE Compute MR Gen11 and Gen10 Plus Controllers - Controllers On HPE ProLiant AMD Gen11 Servers and Gen10Plus Servers Do Not Support Microsoft Secured-Core and AMD DMA Remapping (DMAr)</li>
	<li>Fix a00133091en_us: Storage Information Might Be Lost in iLO When Drives Are Behind MR Controllers In Passthrough Mode</li>
	<li>Fix a00134330en_us: HPE MR Gen10 Plus/Gen11 Controller - Non-Volatile Memory Express (NVMe) Drive FWPKG Flash Through HPE Integrated Lights-Out (iLO) Does Not Reflect the New Firmware Version on the Storage Page</li>
	<li>Fix an issue that NVMe passthrough command may hang when getting log page over 1MB data</li>
	<li>Fix an issue that setting JBOD shows sucessful, but JBOD does not appear to be created when all the target IDs (0 to 239) are exhausted.</li>
	<li>Fix an issue that Log Sense page 0x15 fails on ACS-5 supported SATA drive</li>
	<li>Fix an issue that crashdump.txt is taking longer than 15s to generate for ondemand snapdump</li>
	<li>Fix an issue that some snapdump prints flood the uart</li>
	<li>Fix a rare issue that logical drive data might be corrupted when expected power loss happens in the completion of copyback operation.</li>
	<li>Fix a rare issue that snapdump might not finish collecting events and generate incomplete snapdump when power off system</li>
	<li>Fix an issue that BatteryOK RDE alert was logged after every AC power cycle of the server</li>
	<li>Fix an issue that predictive failure RDE alert for a drive was logged twice on a single server reboot or controller reset</li>
	<li>Fix an issue that drive count for the enclosure might not be correct when pulling all drives simultaneously.</li>
	<li>Fix an issue that PLDM firmware update on drive fails when there are different drive models are connected to the controller</li>
	<li>Fix an issue that firmware might crash when the UBM controller is in non operational mode</li>
	<li>Fix Volume schema property IOPerfModeEnabled to be always enabled since it is dynamically decided by the controller</li>
	<li>Fix an issue that RSOD occurs when selecting the Enclosure Management for MR416i-p from System Utility Menu in ML30 Gen10 Plus</li>
	<li>Fix an issue that firmware fault might occurs when Self-Test page request is sent to the low power mode NVMe drive</li>
	<li>Fix an issue that Battery Charging Redfish Event is not generating</li>
	<li>Fix an issue that Status is not updated for the Volume resource when copyback operation is in progress</li>
	<li>Fix a rare issue that firmware fault might be observed while removing the foreign drives from the configuration</li>
	<li>Fix an issue that empty JSON PATCH request from REST client results in incorrect HTTP error code</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="225a3736a3d645ae82a85050bf27993e" version="9d5cfbf688c941f8b32d66a3caea7125" lucid_version="VK000240GWSRQ_VK000480GWSRR_VK000960GWSRT_x64@HPG4(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c0403221bbc14b609f9dc339f216be5e" version="a71a4e39621946cdb5b8018b660253f3" lucid_version="MM1000GFJTE_ESXi@HPG6(B)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6ac4c1fb52734dc69d27fd9966ff92b4" version="867cba3345cb4894b1e55aa46ba5748b" lucid_version="ixgben.vmware80@2023.09.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.09.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product updated the copyright of the new year and compatibility with firmware.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fix an issue that TCP traffic on VMs might be interrupted if PF undergoes a reset.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cf3d0ea161014094b2ae4ebd26456a93" version="9817f50e1a5447869926411404ec34ce" lucid_version="MK000480GZXRA_MK000960GZXRB_MK001920GZXRC_x64@HPG1(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a970944cf8a44d27bcff8a800d52aa6b" version="c78876e1b72140a4b04a0678d62df30e" lucid_version="qla2xxx.rhel8.x86_64@10.02.11.00-k1(z)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.11.00-k1" revision="z" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.02.11.00-k1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5691df43dd354d538b509faabb482ba9" version="37a10b3b75c448688dfd01d80d967e43" lucid_version="MO0200JEFNV_MO0400JEFPA_MO0800JEFPB_MO1600JEFP_x64@HPD3(L)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (K)" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="990fcc25e986467fbdc6e3aae2e41a2c" version="a442b17d31ba465e9449370f1a4697b7" lucid_version="KCM6XVUL800G_KCM6XVUL1T60_KCM6XVUL3T20_x64@GPK7(B)__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="GPK7" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="GPK6 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>
	<p>This component provides support only for VMD enabled Intel VROC platform</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b3a8e7e2c4ea466a9b404955f474449e" version="9f9f4a4c3ed64beebd095e0ec19734ec" lucid_version="isut.linux_x64@5.0.0.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.0.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="88920b6128524213bc79e665d9b3a53b" version="4d9e820234db45faa4d58b34d5a9d4df" lucid_version="evbd.win64@7.13.206.0(C)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="7.13.206.0" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with CS5.0&nbsp;compliance</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.13.206.0 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with CNSA (Commercial National Security Algorithm) compliance.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue where System crash while upgrading with NPAR SRIOV-EP mode enabled.</li>
	<li>This product correct an issue where BSOD in Windows NDIS driver while in WS2022 PCS Configuration.<br />
	&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a52400877136470a91bffe4592bf0bf8" version="0441cdc1dc11472a8bed8925766cc7e8" lucid_version="bnxt_roce.rhel8u7@228.0.133.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="228.0.133.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.0.130.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed a system crash issue observed on running RoCE and L2 IO with Virtual Function creation/deletion and triggering firmware error recovery.</li>
	<li>This product fixed a system crashed issue while running the RoCE hammer on Wh+ with 8K pertest and 8K graf work QP&#39;s.</li>
	<li>This product fixed an issue that RoCE driver took longer time than expected to close in PCIe-AER fatal error.</li>
	<li>This product fixed RoCE error recovery fails upon injecting error on Thor&nbsp;adapter with 32K qps ib_send_bw IO.</li>
	<li>This product disabled RoCE LAG support for Wh+.</li>
	<li>This product restriced RoCE resources for Wh+ adapters.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="486d4489346f4ec8a160ad4ef3c94f99" version="dd71c3fd63694d4bb5bc58d0e33b2f2c" lucid_version="EH000900JWHPP_EH000600JWHPN_EH000300JWHPL_ESXi@HPD8-rev2__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine &ldquo;sweeping&rdquo; of the media surface.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00127593en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00127593en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine &ldquo;sweeping&rdquo; of the media surface.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a271f679286141d98830336f93a8205f" version="c2c1972fd2d14440b649181179760789" lucid_version="Apollo_4200_Gen10_Plus.ESXi@0.39(C)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="0.39" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update build environment with SHA384</li>
	<li>Update OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0.39 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modify Product ID&nbsp;to &quot;A4200 Gen10P LFF&quot; and &quot;A4200 Gen10P SFF&quot; to distinguish the different generation expander backplane.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f2d480bbb5d747efac90df2828bbca07" version="57f6ceae3be447cda8ee1ef1bc656b04" lucid_version="VK003840GWSXL_ESXi@HPG3(D)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="81cb1e1fa07441fc9994562f591c5c30" version="c8cea4869622480bb9f1da12bf17d860" lucid_version="netxtreme2.rhel9@7.15.17-7__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="7.15.17-7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product enhanced the compatibility with Linux firmware component 2.34.0.</li>
	<li>This product now supported for Red Hat Enterprise Linux 9&nbsp;update 3.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.15.17-1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supported for Red Hat Enterprise Linux 9.2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eca7d77c8ba84ffe9014dfb5c3b6ee15" version="be15c0a33854400b87e12a551d8e7083" lucid_version="EH000900JWCPN_EH000600JWCPL_EH000300JWCPK_x64@HPDA(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDA" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize sensor reporting to improve failure rate - AFR (Annual Failure Rate) metrics</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eaadba373a2b4b7ab82c00e6e1f55628" version="4b558757bfc642d79d5d397cf866fcdb" lucid_version="MB014000GWUDA_ESXi@HPG2(H)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4106b2f5d7c1411c95e94d52dff63df7" version="0de0d2c8ce454b88b10625b5939d5645" lucid_version="MM1000GFJTE_x64@HPG6__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (E)" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="43151427676f44dcaced68356cf6359c" version="c655fc5b37c04dde8963e86d422ec17c" lucid_version="igbn.vmware80@2023.09.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.09.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fix an issue that TCP traffic on VMs might be interrupted if PF undergoes a reset.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2180429b88ed4e24883a75dbd70724b0" version="15b4f7c39dcb46f3863856c18d60f4fe" lucid_version="i40e.rhel9@2.23.17-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.23.17-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports PHY debug register dump by ethtool.</li>
	<li>This product now supports Red Hat Enterprise Linux 9.2.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct&nbsp;an issue where the NVM fail to update due to the improper 802.1q VLAN tag feature detection.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.23.17-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports PHY debug register dump by ethtool.</li>
	<li>This product now supports Red Hat Enterprise Linux 9.2.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct&nbsp;an issue where the NVM fail to update due to the improper 802.1q VLAN tag feature detection.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="83ce77cbc6db45d29c95de38716f222e" version="8367a51a66e342259a2e676fecc04f7b" lucid_version="MB014000JWUDB_x64@HPD3(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6ac7b8d3be52435988e4a4093d14ac71" version="2952e19c95d84f4694b8ea368bc6c069" lucid_version="esxi80-fc-enablement-sw-bundle-sc@2022.09.01-rev2__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2022.09.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Supports VMware ESXi 8.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2022.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Supports VMware ESXi 8.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="701e4c02b7354b79b14e21a9c2a46dd5" version="8956b40b5d28467c9264bcb0f4ba1f47" lucid_version="ssacli.vmware7.0.sc@2024.04.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.04.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>For 2024 March MSB</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.10.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="82c132821386400981a2aa2f6b8eb7dc" version="bbbb01f7a5ce478985a90807546a582d" lucid_version="mlnx_mft.sles15sp5.x86_64.rpm@4.26.1-3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.26.1-3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.24.0-72" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="62fc8de385854321919207903df8d568" version="59ddbebb73d34aa9abc8c694abe95e85" lucid_version="qla2xxx.rhel9.x86_64@10.02.11.00-k1(b)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.11.00-k1" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>

<p>This Driver is FIPs enabled.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This Driver is FIPs enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.02.11.00-k1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c8581e07bdde4d5584c0276be971751e" version="02bf895577ce4398baf9044706dc2e92" lucid_version="amsd_rhel8@3.5.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.5.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The RHEL8 AMS rpm is now FIPS compliant</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:&nbsp;</p>

<ul>
	<li>Fixed the issue where AMS was crashing after plugging and removing a USB drive</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.4.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The following enhancements are included in this release:</p>

<ul>
	<li>A warning&nbsp;and terminate&nbsp; amsd message is now displayed when&nbsp;system SW RAID is enabled</li>
	<li>Added &quot;support iLO6&quot; string to the description field of the amsd installation file</li>
	<li>Added ahslog service status to system log</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:&nbsp;</p>

<ul>
	<li>Added an error handling mechanism so that the ahslog service will no longer crash when there is no system package or the packet is NULL.</li>
	<li>Customers who use the snmpwalk command to query cpqSePciSlotWidth OID will see the correct data reported for all ports</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b929c06b33df46a182acd3e907e0dc53" version="9294cd5a9f2848e986f1990008befe4c" lucid_version="emulex.fc.fw.win.x64_rt@2023.10.01__sc-windows-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.19</td>
			<td>14.2.589.19</td>
			<td>14.2.589.16</td>
			<td>14.2.566.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.19</td>
			<td>14.2.589.19</td>
			<td>14.2.589.16</td>
			<td>14.2.566.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.5</td>
			<td>14.2.589.5</td>
			<td>14.2.579.0</td>
			<td>14.2.566.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.5</td>
			<td>14.2.589.5</td>
			<td>14.2.579.0</td>
			<td>14.2.566.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fe217a349ea5432eb992dea833e5cc7b" version="c45890cc08b24738b077e0915fcb108b" lucid_version="MLNX_Ethernet_Only_NIC_MFT_FW_package.esxi80@1.0.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</li>
</ul>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2311760d35054ca48230493dff4b743b" version="d8a1282d2ac4463ea601dfce98aa9e0a" lucid_version="EH0300JDYTH_EH0450JDYTK_EH0600JDYTL_ESXi@HPD6(L)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (L)" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dc0fcbf999ba4988aa8b4eae8e8c9889" version="981b90e7cbf74fd99a55106393b997ca" lucid_version="VK000240GZXRU_VK000480GZXRF_VK000960GZXQU_ESXi@HPG1-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b013dc662ea446dbabf5ade1d9cf8d6f" version="66531fa516f54fb5b09ea597cae9e6b6" lucid_version="EG1800JFHMH_ESXi@HPD8(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e99fcbdfe7054c0191086c267b0b5462" version="98908cffb9d6438db22cbe16d814a490" lucid_version="U61.Linux@2.00_02-01-2024__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p>Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI ASPM to Disabled/L1 Enabled.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Added "DMI Power Management (ASPM)" option in RBSU. The option has the default value of "disable", which will override default setting of "enable" from the previous ROM. This is due to enabling DMI power management might result in system hang with machine check exception based on Intel erratum RKL-15.</p><p>The path to the option is: Processor Options -> DMI Power Management (ASPM)</p><p></p><p>This setting has the Redfish property URI of: /redfish/v1/systems/1/bios/settings/E3DmiAspm</p><p></p><p>To follow DMTF schema, change the Redfish registry version naming to have the pattern of "^\d+.\d+.\d+$".</p><p>For example, /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will now becomes /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.4 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2023-23583. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.1.1v update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4bdcb7d3fc5c4d14af793003b89e365b" version="8d5e8792d1d54c87a77c12bfae6569f7" lucid_version="U45.fwpkg@3.10_02-22-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_10-19-2023 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where Restore Manufacturing Defaults and Restore Defaults from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="64511cd7ad8d42fea109336ca7a083a0" version="12b17846ab174776ac5bbd9ddcd0a0f7" lucid_version="MLNX_VPI_CX6_HCA_MFT_FW_package.esxi80@1.0.3__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 20.40.1000:</strong></p>

<ul>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21</li>
</ul>

<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>No New features or changes have been included in version 20.40.1000.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.40.1000:</strong></p>

<ul>
	<li>RDE LLDPTransmit ChassisID was occassionally not represented correctly.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 20.37.1700:</strong></p>

<ul>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21</li>
</ul>

<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 20.37.1700:</strong></p>

<ul>
	<li>A new capability enables the VM to track and limit its Vport&#39;s activity. This is done using the new q_counters counter which enables aggregation of other Vport&#39;s from PF GVMI.</li>
	<li>Updated the link maintenance flow to avoid high uncorrectable error rate.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No new fixes have been included in version 20.37.1700</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1e10e20d274448bb9d2d1625880b482d" version="945499bb6cd544968e1cc1255fcf6b2e" lucid_version="nicfwupg_qlnx2.win64@5.3.6.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.3.6.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.3.5.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with drivers</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a6840b5d0ec24ee78bf7a78ec26db476" version="a216f53c7aa748b8853fca1bd9cc84b4" lucid_version="MR000240GWFLU_MR000480GWFLV_VR000480GWFMD_MR00_x64@HPGG(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGG" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGG (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c549eb5726da4e0ab54cbcdd6abecebd" version="bb8d8720e250478ab4469c815d80ef90" lucid_version="bnxt.rhel9@1.10.2-228.0.133.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.10.2-228.0.133.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.10.2-227.0.130.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product allowed GPU direct DKMS package to skip building peermem module if support already exists in kernel.</li>
	<li>This product now supported rdma driver version query from ipmi interface.</li>
	<li>This product now enabled XPS by default on driver load.</li>
	<li>This product added support for Red Hat Enterprise Linux 9.2.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed an issue that DKMS RPM packages failing to build driver.</li>
	<li>This product fixed an issue that driver and tools DKMS package unable to run POST_INSTALL script.</li>
	<li>This product fixed a hang or crash issue when running ntuple scaling tests.</li>
	<li>This product fixed a kernel panic issue when PHC UPDATE async event comes.</li>
	<li>This product fixed an kernel crash issue when SRIOV is disabled while PF is being moved from switchdev to legacy back and forth in a loop and also while set channels (ring number change) is run in a loop.</li>
	<li>This product fixed HOT Reset Timout in scaled up incremental flows.</li>
	<li>This product fixed an issue that port stop/start all in a loop triggers memory corruptions after couple of hundred iterations.</li>
	<li>This product fixed a host crash issue when adding/deleting filters with traffic.</li>
	<li>This product fixed an issue that kernel throws WARN as firmware coredump lengths differs.</li>
	<li>This product fixed a host crash issue on null pointer firmware crash when filters are being added on another host.</li>
	<li>This product fixed a system crashed issue after enabling RDMA followed by firmware reset and L2 driver unload.</li>
	<li>This product fixed warnings observed while compiling bnxt_re driver on kernel.</li>
	<li>This product fixed a system crash issue observed while running self-test on port 1 when LAG is configured.</li>
	<li>This product fixed a driver crash issue after exiting XDP mode.</li>
	<li>This product fixed a crash issue when processing PTP packets on NPAR functions.</li>
	<li>This product fixed a system crash issue while binding PF back to bnxt_en after binding it to vfio-pci and launching testpmd.</li>
	<li>This product fixed a possible SKB out-of-bounds access.</li>
	<li>This product fixed a crash issue observed while running the ethtool command while unloading the driver.</li>
	<li>This product fixed VF resource limits issue.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5045a1cc5fa8419eb51ea71375c56468" version="33a9fff5b20a4376907036ec099238e5" lucid_version="bnxt_roce.rhel8u8@228.0.133.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="228.0.133.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.0.130.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed a system crash issue observed on running RoCE and L2 IO with Virtual Function creation/deletion and triggering firmware error recovery.</li>
	<li>This product fixed a system crashed issue while running the RoCE hammer on Wh+ with 8K pertest and 8K graf work QP&#39;s.</li>
	<li>This product fixed an issue that RoCE driver took longer time than expected to close in PCIe-AER fatal error.</li>
	<li>This product fixed RoCE error recovery fails upon injecting error on Thor&nbsp;adapter with 32K qps ib_send_bw IO.</li>
	<li>This product disabled RoCE LAG support for Wh+.</li>
	<li>This product restriced RoCE resources for Wh+ adapters.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="18e9f59fd9934421b3a1eafac327542f" version="babede8548d74cd1abd2a49e2cf86e68" lucid_version="VO001920KWZQR_VO003840KWZQT_x64@HPK7(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK7" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK7" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Maintenance release with fix for LED off during idle</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="637d540b39214addb4d18ef0c3a8cbbf" version="e582d5bb1b874e92b285d7395b0cb00f" lucid_version="MLNX_VPI_Ethernet_Infiniband_HCA_FW_package.x64@1.0.0.12(A)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.12" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following changes have been made&nbsp;in sub-version 1.0.0.12(A):</strong></p>

<ul>
	<li>Product rebuilt to have the new SHA 384 signature.</li>
</ul>

<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.12" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fdb3892daac8474c8262b342acf8f35f" version="b221391de8cd4923a0f99e228314e1b4" lucid_version="nicfwupg_bcme.vmware@5.21.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="5.21.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.20.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed PFC flood problem when shut down system while running RoCE traffic.</li>
	<li>This product addressed PCIeVDM communication problem between BMC and NIC after an error recovery.</li>
	<li>This product addressed the PHY level packet drop.</li>
	<li>This product addressed the problem of multi-cast traffic gets leaked to unintended functions.</li>
	<li>This product addressed the reporting mechanism of NCSI max temperature.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8384f9a8878649da8d668b07fb30c48e" version="7b039a6e0c43453bb3f4277d10329c31" lucid_version="iLO5_FW_WIN.X64@3.03-rev1__sc-windows-fw-ilo_en"/>
      <revision_history>
        <revision>
          <version value="3.03" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>None.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:48px">Fixed incorrect messaging when FW update failed with BundleUpdateComponent download failure</p>

<p style="margin-left:48px">Fixed bundle update status reporting when Component download fails after all retries done.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.03" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>None.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8dc1af4f4f75416590a7ddb9bd07a92c" version="11c6af326aaf455f81ff16acb531611f" lucid_version="ixgben.vmware70@2023.10.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.03.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with new version of the firmware.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="33179a0f0a644a26bd07818fb3f2db4e" version="792dc52d72f64eb2aba2b31ec2d01016" lucid_version="VK000240GZXRU_VK000480GZXRF_VK000960GZXQU_x64@HPG1(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>High Security Enablement support FIPs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="58e30c6460374d34ab64c2a8547dafe2" version="29fd7ef9df984d4787c68707847e7a3c" lucid_version="nicfwpkg_intel_e810_2cq2sec@4.30__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="4.30" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp; ResetToDefault property(RDE Port Schema).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where InterfaceEnabled property is read only and it can&#39;t patch this property</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dd0182917bf14543bf436162a2a05331" version="1817f85a00d0422a964c50d8caba94ff" lucid_version="MB018000JXMTH_MB020000JXMTP_x64@HPD2__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Assert fixes, logging enhancements and all current firmware improvements and bug fixes.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fcf6b49416e1460393e2103c04483878" version="5372fc7957cc40919bfe57941828240d" lucid_version="MB008000JWJRQ_MB006000JWJRP_x64@HPD9(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="121d8116603e47a49293c085684f3fa1" version="fe61e180a82f4734aa9d23b2273fc1b2" lucid_version="EG1800JEHMD_x64@HPD6(M)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="M" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (L)" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6aac2d7fdad54ca7910ee0bb1e81d6f3" version="2919238d69f64cdcb54bd9711d3088ef" lucid_version="FWPKG-P45642-B21@28.40.1000__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="28.40.1000" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New features and changes included in version 28.40.1000</strong>:</p>

<ul>
	<li>Socket Direct Single netdev Mapped to Two PCIe Devices: Enabled Single Netdev mapping to two PCIe devices (Socket Direct). Now multiple devices (PFs) of the same port can be combined under a single netdev instance. Traffic is passed through different devices belonging to different NUMA sockets, thus saving cross-NUMA traffic and allowing apps running on the same netdev from different NUMAs to still feel a sense of proximity to the device and achieve improved performance. The netdev is destroyed once any of the PFs is removed. A proper configuration would utilize the correct close NUMA when working on a certain app/CPU. Currently, this capability is limited to PFs only, and up to two devices (sockets). To enable the feature, one must configure the same Socket Direct group (non zero) for both PFs through mlxconfig SD_GROUP.</li>
	<li>Port Rate Limiting: Added a new access register (PBWS) to set the port maximum bandwidth to a value between 95% to 100%.</li>
	<li>Added support for egress ACL to the uplink by adding a new bit to the Set Flow Table Entry: allow_fdb_uplink_hairpin.</li>
	<li>Added support for live migration with MPV and IPSEC. This capability enables creating cross-vhca objects, however, they can only be created between affiliated GVMIs. If&nbsp;<em>HCA_CAP.migratable</em>&nbsp;bit is set,&nbsp;<em>HCA_CAP.cross_vhca_object_to_object_supported</em>&nbsp;and&nbsp;<em>HCA_CAP.allowed_object_for_other_vhca_access</em>&nbsp;refer to affiliated VHCAs only.</li>
	<li>Added back the Digital Feedforward Equalizer (DFFE) hardware component to improve the signal integrity link.</li>
	<li>Enabled the lowest minimum rate for SW DCQCN to enable congestion control to hold a larger amount of QPs without pauses or drops.</li>
	<li>Modified PCIe switch downstream port EQLZ.PH1 timing to 3ms.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 28.40.1000:</strong></p>

<ul>
	<li>Congestion Control did not work as expected when Global Route Headers (GRH) was used in traffic of an IB cluster.</li>
	<li>SPDM requests received when CPLD burn flow in progress were answered with incorrect responses.</li>
	<li>When ConnectX-7 adapter card was configured to use the Auto-Negotiation mode, 400G_8x linkup could not be raised.</li>
	<li>When performing a stress toggling on a ConnectX-7 adapter card that was connected to P65334-B21 cable and the speed is set to 100G_1x with interleaved FEC, a long linkup time of up to 5 minutes occurred.</li>
	<li>When raising a link using 200G optical cables while connecting a ConnectX-7 to a ConnectX-7, raising a link with width less than the maximum provided by the cable with speed 25G lane was not supported.</li>
	<li>When raising a link using 400G optical cables while connecting a ConnectX-7 to a ConnectX-7, raising a link with width less than the maximum provided by the cable with speed 50G or 25G lane was not supported.</li>
	<li>WoL packets did not work properly if sent to Unicast destination MAC.</li>
	<li>When performing PCIe link secondary-bus-reset, disable/enable or mlxfwreset on AMD based Genoa systems, the device took longer then expected to link up, due to a PCIe receiver termination misconfiguration.</li>
	<li>Disabling the Relaxed Ordered (RO) capability (relaxed_ordering_read_pci_enabled=0) using the vhca_resource_manager was not functional.</li>
	<li>In rare cases, linkup time of NDR and NDR200 with P49764-B21 transceiver took longer than 60 seconds.</li>
	<li>Selective-Repeat configuration issue which occasionally caused retransmission to wait for timeout instead of out-of-sequence NACK.</li>
	<li>The secondary ASIC run module init failed due to missing condition.</li>
	<li>The adapter cards&#39; quad ports were kept UP when using breakout cables / QSFP-split-4.</li>
	<li>A rare race condition in NODNIC teardown that caused commands to hang on regular PF.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="28.39.1002" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Note: This firmware (with a new GPIO configuration) improves long-term ConnectX-7 reliability. HPE strongly recommends all customers upgrade to this firmware version at the earliest opportunity.</strong></p>

<p>&nbsp;</p>

<p><strong>New features and changes included in version&nbsp;28.39.1002:</strong></p>

<ul>
	<li>Added support for two passthrough channels on dual-port adapter cards.</li>
	<li>Added a caching mechanism for improved expansion ROM performance and to avoid any slow boot occurrences when loading the expansion ROM driver.</li>
	<li>Added support for image size above 4GB when performing a live migration by splitting the image to chunks.</li>
	<li>Extended the role-based authentication to cover all crypto algorithms. Now the TLS, IPsec, MACsec, GCM, mem2mem and NISP work when nv_crypto_conf.crypto_policy = CRYPTO_POLICY_FIPS_LEVEL_2 i.e, all cryptographic engines can also work in wrapped mode and not only in plaintext mode.</li>
	<li>Added the ability to configure the DSCP (priority) of ACK packets using the ROCE_ACCL access register.</li>
	<li>Added internal monitoring and external notification mechanism to detect over access to the flash interface and reduce access to it to avoid exceeding some hardware limitation on that interface. In extreme cases, if this mechanism is not sufficient, the user will be notified.</li>
	<li>Added support for reserved mkey index range. When enabled, a range of mkey indexes is reserved for mkey by name use.</li>
	<li>Disabled PCI power event messages on OCP 3.0 adapter cards according to the spec requirements.</li>
	<li>Added support for hairpin drop counter in QUERY_VNIC_ENV command.</li>
	<li>Improved SPDM v1.0 compatibility.</li>
	<li>Changed the bar configuration algorithm so that the last update to the bar address will be the one that takes affect when the host configures the same bar address for two different PFs.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 28.39.1002:</strong></p>

<ul>
	<li>A code mismatch in the process of handling the cause to the link being down when the remote faults were received.</li>
	<li>An incorrect parameter in the cable info MAD resulted in unnecessary messages in the log.</li>
	<li>An issue that caused the buffer for PLDM firmware update that were pending NIC requests to not being properly locked in case of PLDM-over-NC-SI, and consequently being corrupted by other flows.</li>
	<li>An issue that prevented MSI Interrupts from being advertised correctly, resulting in incorrect MSI being sent.</li>
	<li>&quot;Get Temperature&quot; OEM command did not return a unified temperature occasionally.</li>
	<li>An issue that caused the firmware to miscalculate the value of the maximum current temperature measured from all the diodes (found in the Internal_sensor_curr_temp field).</li>
	<li>Transaction loss when cache replacement transaction occurs in parallel to code transcoding.</li>
	<li>The eeprom module got stuck in polling 20% of the times after reset. To resolve the issue, a delay after config module to high power was added.</li>
	<li>A linkup failure issue that occurred when connecting to a 25GbE transceiver by clearing the PSI Aging before trying to open Tx power.</li>
	<li>A &quot;Bad Signal Integrity&quot; message was seen after power cycle.</li>
	<li>A statics issue that caused the i2c access module to lock and make the switch unresponsive.</li>
	<li>An issue that prevented the get_func_num_from_pci_func_num function from returning the value &quot;-1&quot; for undefined function type.</li>
	<li>Incorrect Signal-to-Noise Ratio (SNR) readings from the &quot;P49764-B21&quot;&nbsp;optical cable module.</li>
	<li>A race condition occurred between insertion and deletion of the same rule in parallel. Such behavior occasionally resulted in firmware accessing a memory that has already been released, thus causing IOMMU / translation error.</li>
	<li>A race condition that led to a firmware assert upon driver removal, or when changing the ETH flow control scheme in case of a stress of larger than MTU ingress packets.</li>
	<li>Incorrect QoS Shaper handling behavior for non-transmitting applications.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="17666522baed46e695f28d4315d6fdb8" version="a37091bd105640cea09133caab2c52f6" lucid_version="MLNX_Ethernet_Only_NIC_MFT_FW_package.x64@1.0.0.6(A)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.6" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</li>
</ul>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following changes have been made&nbsp;in sub-version 1.0.0.6(A):</strong></p>

<ul>
	<li>Product rebuilt to have the new SHA 384 signature.</li>
</ul>

<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</li>
</ul>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e6bb5c297d78402ab079f188773b5efc" version="49e7c456b61c47d086b8bb1ab04d6627" lucid_version="mellanox_winof2.w2k22@23.10.26252.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="23.10.26252.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="23.4.26054.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the ports&#39; number information in the Device Manager. Now the Information Pane of Properties of NIC adapter displays information of more than 2 ports.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="939eb4c97d9745fe9b103a023bb5c6ab" version="44b6694a13874ad3ad8a1301ca5be170" lucid_version="VO001920KWZQR_VO003840KWZQT_ESXi@HPK7(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK7" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK7" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Maintenance release with fix for LED off during idle</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c4ef0470aa934a20948f1a88d8eff26d" version="da79190d49314334be9f0e8a7173ff1a" lucid_version="VO000960JWZJF_VO001920JWZJH_VO003840JWZJK_x64@HPD5(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eea0fcde2dfe4c0ebeb9ed47ea130474" version="fbb5ac518531485a9cefaccb32ee3105" lucid_version="i40en.vmware80@2023.10.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6510bb61b44e4df589649e5642d32bf1" version="0e29a9ce2da748a39c496861d5cd28fa" lucid_version="intel_i40ea.w2k19@1.18.367.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.18.367.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.16.202.10" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of FVL9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="459b31cbafbe408eaf0a96421248c984" version="e4c929fd24d5410a9ee811753dca05c8" lucid_version="MZXL5800HBHQ-000H3_MZXL51T6HBJR-000H3_MZXL53T2_x64@MPK77H5Q__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="MPK77H5Q" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix known FW bug PI/CI indexing issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="MPK76H5Q (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA <a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f5aa8733027b4498a80cd2e690d91986" version="bdd38c4de038476e8b41d6f133a7bde9" lucid_version="U31.Linux@3.10_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fc2945bc3e5744fea9d120a012546560" version="14776372915d4aa6b64a6774435dbe92" lucid_version="MB014000GWUDA_x64@HPG2(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>High Security Enablement support FIPs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dd64dbafe6064086a1f60841a460f8b0" version="5f66086dc7304c5fbedc3eab07e80668" lucid_version="bnxtnd.w2k19@228.0.121.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="228.0.121.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.0.125.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed the problem that RoCE driver failed to load with specific active firmware version.</li>
	<li>This product addressed private data retrieval for user mode RDMA connectors.</li>
	<li>This product addressed a fix for NDSPI to correctly detect the type of retransmit capability.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6b0653271f3e4e3a8e730542d61ffed8" version="4870ef929ec34872a4604afda3aaaf19" lucid_version="Gen10P_Gen11_MR_Controller.esxi8.0_bundle@2023.12.01-rev1__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.12.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>New release for version 7.726.02.00.</li>
	<li>This new 7.26 release have not completed vSAN certification, please don&rsquo;t update for vSAN environment for now. Target to complete vSAN certification by end of February 2024.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.12.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>New release for version 7.726.02.00.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="134da74460bf4b5aa8511e630ba5a272" version="a7061b0673ae42c49aef4092d722a857" lucid_version="MicroServerGEN10PlusSPS.fwpkg@05.01.04.913__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.913" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with Intel IPU.2023.3 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.804" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.1 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8ae644bee0c14cc0b7aad5521f061ad1" version="cdb53eadd10749179cd4434e5613a74c" lucid_version="nicfwupg_bcm.win64_Gen10@5.4.0.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.4.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports GetPackageStatus NCSI Command.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.3.6.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The product addressed some Broadcom code structure utilization.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addressed that platform might encounter a POST failure when NX1-based controllers and some storage controllers combines.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2ef4b1fccb0b4e4aa4c8281327ada522" version="f71a4d8303a2413099f32dd946315ace" lucid_version="qla2xxx.sles15.x86_64_legacy@10.02.11.00-k1(b)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.11.00-k1" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>

<p>This Driver is FIPS enabled.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This Driver is FIPS enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.02.11.00-k1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="17ede1952e7d40da9d3235daae0363d6" version="961ca14504cf4f538c23ffb22c1a361f" lucid_version="tg3.rhel8@3.139k-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.139k-1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.139j-1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 8.8.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f72feabcc1cc4495a32d4e127e4da1ce" version="1cd215a621e24e098c2ba59db8b56417" lucid_version="mlnx_en_roce_mlx5.rhel8u9.x86_64.rpm@23.10-1.1.9.1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="23.10-1.1.9.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>No changes or new features included in version 23.10-1.1.9.1.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 23.10-1.1.9.1:</strong></p>

<ul>
	<li>An error was triggered in case devlink reload was attempted when there were allocated subfunctions.</li>
	<li>Changing the steering mode to firmware steering was unsupported for policy IPsec rules.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="55c20afa55214e04bc6d7e8985b8d0b6" version="b314036975ba4939b9bce7317cbe5540" lucid_version="EG001800JWFVC_x64@HPD4(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a08198f75ae64d5f81f313aee3e10a81" version="7b3cc492fcae455f8be350f6a909da14" lucid_version="nicfwupg_intel_open.vmware@3.22.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="3.22.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with the latest drivers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.21.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports VMware vSphere 8.0.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6a808075e9fa4bc19e7d11fd17511784" version="579e6111e43440008ff5c97d3d74cf62" lucid_version="MZXL5800HBHQ-000H3_MZXL51T6HBJR-000H3_MZXL53T_ESXi@MPK77H5Q__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="MPK77H5Q" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix known FW bug PI/CI indexing issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="MPK76H5Q (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="27053985f2354572a6633cc6a63bb7ef" version="d8b10547eb6e4701a33cab083f88dac8" lucid_version="FWPKG-P42041-B21@26.39.1002__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="26.39.1002" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.<br />
<strong>New features and changes included in version 26.39.1002:</strong></p>

<ul>
	<li>Updated the number of channels (ports) that are displayed in the iLO from 1 to 2 (num_channels_per_pkg=2) for dual port adapter cards.</li>
	<li>Added a locking mechanism to protect the firmware from a race condition between insertion and deletion of the same rule in parallel. Such behavior occasionally resulted in firmware accessing a memory that has already been released, thus causing IOMMU / translation error.</li>
</ul>

<p style="margin-left:40px">Note: This change will not impact insertion rate for tables owned by SW steering.</p>

<ul>
	<li>Added a caching mechanism to improved expansion ROM performance and to avoid any slow boot occurrences when loading the expansion ROM driver.</li>
	<li>Added support for image size above 4GB when performing a live migration by splitting the image to chunks.</li>
	<li>Extended the role-based authentication to cover all crypto algorithms. Now the TLS. IPsec. MACsec. GCM, mem2mem, and NISP work when nv_crypto_conf.crypto_policy = CRYPTO_POLICY_FIPS_LEVEL_2, meaning all cryptographic engines can also work in wrapped mode and not only in plaintext mode.</li>
	<li>Programmable Congestion Control is now the default CC mechanism. ZTR_RTTCC is the default CC algorithm when ECE is enabled and the CC algorithm negotiation succeeds, otherwise PCC DCQCN will be used.</li>
	<li>Added new support for reserved mkey index range. When enabled, a range of mkey indexes is reserved for mkey by name use.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 26.39.1002:</strong></p>

<ul>
	<li>Migration data corruption occurred when running parallel save_vhca_state/load_vhca_state commands on the same PF.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="26.37.1700" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New features and changes included in version 26.37.1700:</strong></p>

<ul>
	<li>Modified the RDE behavior to return an error if the chassis ID subtype is AgentId, or Port ID subtype is ChassisComp.</li>
	<li>Enabled VF LAG hash mode. The LAG_RESOURCE_ALLOCATION mlxconfig field is now modifiable.</li>
	<li>A new capability enables the VM to track and limit its Vport&#39;s activity. This is done using the new q_counters counter which enables aggregation of other Vport&#39;s from PF GVMI.</li>
	<li>Added a flow rule that enables offloading of multicast traffic by broadcasting it to multi-Flow-Table in FDB.</li>
	<li>Enables a smooth and statically switch between PCC algorithms. In addition, the user can now switch between PCC algorithms while running traffic.</li>
	<li>Added support for 32 actions in the header modify pattern using bulk allocation.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 26.37.1700:</strong></p>

<ul>
	<li>An issue that prevented the adapter card from handling WoL packets when the host powered up directly into the standby mode.</li>
	<li>CNP received, handled, and ignored counters in the hardware counters could not work after moving to Programmable Congestion Control mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6522bf51105244bfa55540a1e824854d" version="b20107c3c353411b8f03e276c86dc97b" lucid_version="IEGen10Plus.win.x64@1.0.0.22(C)__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.0.22" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.0.22(C) contains updates to the firmware packaging and is functionally equivalent to ver. 1.0.0.22. It is not necessary to upgrade with Revision C if a previous component revision was used to upgrade the firmware to version 1.0.0.22.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.22" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="45e734b674094fd09fe52836988b3440" version="20015faacfff4d009860a489fb8cfc18" lucid_version="nvm.win.x64@3.0.2.0(E)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="3.0.2.0" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.0.2.0 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated installation time</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="87793aff72a54849a327ce026784372d" version="4fd630b936f34fc8971a03af8f74ebb8" lucid_version="e1r.w2k19@12.18.16.0-rev1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.18.16.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which fixes the device will be disabled and event ID 10400 after iPerf test.</li>
	<li>This product correct an issue which fixes link flapping while performing network traffic on the links of the network adapter.</li>
	<li>This product correct an issue which fixes unexpected transmission stop.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.18.16.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which fixes the device will be disabled and event ID 10400 after iPerf test.</li>
	<li>This product correct an issue which fixes link flapping while performing network traffic on the links of the network adapter.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="05a81ac262384916b1fa6e922a6cada6" version="ebb0a1dcaa5c4cc39bd3b010b8d3396f" lucid_version="MB014000GWRTN_MB012000GWRTL_MB010000GWRTK_x64@HPG2(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="057a33153b064c9280dd7da9d3d5a47a" version="5f61517c5dbb4b4484fab25df29d61a5" lucid_version="EG001800JWJNL_EG002400JWJNN_x64@HPD5(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Sever 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware mitigates a potential reliability concern.</li>
	<li>The firmware applied the new seek recovery mechanism to improve the level-down condition and highly reduce the media errors from occurring.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b1381f6ec67b40269898593ac27aca95" version="19ce3ab3ab6c4a01b1ec2622146acbae" lucid_version="MB004000JWWQB_MB002000JWWQA_ESXi@HPD8-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="17ae190412f049ff80b7f941eb9e3732" version="b5baf47d86ac4ce7bb515a7debfd90c4" lucid_version="A46.Fwpkg@3.00_01-26-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.



This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.



This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.



This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.



This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p><p></p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-27-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.

This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision provides AMD's mitigation for security vulnerabilities for CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2bd1c3f2d559498081c13ef5a6c74bb4" version="d5ad8f3224c640299698fea576433a14" lucid_version="U48.Linux@3.00_02-01-2024__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.

This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 05.01.04.913.<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.</p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where Restore Manufacturing Defaults and Restore Defaults from iLO web did not restore the Secure Boot Status.</p><p></p><p>Addressed an issue where system might hang while accessing IML log from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="be910528f863487899cf62f353be4a46" version="379ada34912847fb9d9108e38bf79755" lucid_version="MB006000JYDNF_MB008000JYDPC_ESXi@HPD2(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="25298d41e8ae4c7a847f78be945ec24d" version="87f07b906eb046eb8a58130b911d819a" lucid_version="MB001000GWFWK_MB002000GWFWL_ESXi@HPG6(H)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="92d9bf17d9ef471e842a80e42a41ec72" version="bee61c16cb954babac94d7e7d87556f0" lucid_version="MB008000GWRTC_x64@HPG1(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5e76fbf672b8432aa6436d748dacb463" version="b018b258754c4d14a140fe9d4cc9f130" lucid_version="MB008000JWJRQ_MB006000JWJRP_ESXi@HPD9(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="14652a1a392747089da4a4254064ac9d" version="f61fbf41245f4b7a87cb368dad08ad7a" lucid_version="a41.fwpkg@3.00_01-26-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with vulnerability fixes in EDK2 NetworkPkg IP stack implementation that is described in the address https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.



This revision of the System ROM includes AMD reference code NaplesPI 1.0.0.K for AMD 1st Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where Restore Manufacturing Defaults and Restore Defaults from iLO web did not restore the Secure Boot Status.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="738515ca087c45c4b01b62883007bfb8" version="5af8eed250dc45eca6dd91a863a2c452" lucid_version="MZXLR800HBHQ-000H3_MZXLR1T6HBJR-000H3_MZXLR3T_ESXi@MPK7725Q__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="MPK7725Q" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix known FW bug PI/CI indexing issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="MPK7625Q (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA <a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8e8fd25144334177930f2db95d492320" version="cd9a3273c26c4fbe952f4b0c2c4b8063" lucid_version="VK000480GWTHA_VK000960GWTHB_VK001920GWTHC_x64@HPG4__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the issue that certain SSDs may report false predictive failure in the integrated management log (IML).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d68bbaf07f264bc58eca252afa60fffc" version="4c25a546f7524b048343dd738a57f500" lucid_version="mlnx_mft.rhel8u8.x86_64.rpm@4.26.1-3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.26.1-3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.24.0-72" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dee0352e8d5a4157b5757fd1a1669bb8" version="17971f8ecf4343838a0b0a77248af0f5" lucid_version="VK000240GWCFD_VK000480GWCFE_VK000960GWCFF_x64@HPG3(K)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7ebf7b3b32234babb113c6746f09f68e" version="a1c5edaf427947e68fdba5fa83c9a52c" lucid_version="U38.linux@3.10_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6d1e58e8f89340958bf7818046e9b7c7" version="d06bea96dea4449da905e1e2eff04ee9" lucid_version="mlnxcx4.w2k19@23.10.26252.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="23.10.26252.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="23.4.26054.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the ports&#39; number information in the Device Manager. Now the Information Pane of Properties of NIC adapter displays information of more than 2 ports.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="14160fbfa3db428fb3e9bea4f7d651a7" version="50c6376f0dc447bf8485dccf7add7a33" lucid_version="nicfwpkg_bcme_5750x@228.1.111.0__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="228.1.111.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed RoCE read_context HWRM fails for CQ.</li>
	<li>This prodcut fixed SRv6 Tunnel Alloc failure.</li>
	<li>This product fixed NVRAM failure when simultaneous NVRAM reads and write/erase operations.</li>
	<li>This product fixed the problem of adding VF to VM resulted in the offloaded flows from being offloaded.</li>
	<li>This product fixed the problem of promisc filter not being removed if created with a default vlan.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.1.111.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed PFC flood problem when shut down system while running RoCE traffic.</li>
	<li>This product addressed PCIeVDM communication problem between BMC and NIC after an error recovery.</li>
	<li>This product addressed the thermal threshold defaults for OCP scan chain.</li>
	<li>This product addressed the problem of stuck at busy state if BMC is doing reset while NIC sending SMBUS message.</li>
	<li>This product addressed MAC lost problem when power outage occurs during installation.</li>
	<li>This product addressed potential memory leak problem.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="188f54d508794fafbb14f21866a0ffb5" version="33a731a1250c4b11ba79030e812a8e51" lucid_version="MB004000JWKGU_x64@HPD2(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6559625804344daab70667e2f1b0b044" version="47f00c3a19544c7faa5056bc2efd2e41" lucid_version="MB004000JWWQB_MB002000JWWQA_x64@HPD8(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue in previou version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4eb73551b4784537817e4ada8a1d49b5" version="e01b96b12f184e92b6c3adba03456957" lucid_version="U46.linux@2.00_03-06-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_03-06-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.<br />
This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel&#39;s mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.&nbsp; This issue is not unique to HPE servers.<br />
Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.<br />
Addressed an issue where NVME hot plug when installing fully loaded NVME drives.<br />
Addressed a potential security vulnerability in some 3rd and 4th Generation Intel&reg; Xeon&reg; Processors when using Intel&reg; Software Guard Extensions (SGX) or Intel&reg; Trust Domain Extensions (TDX) may allow escalation of privilege, as documented in CVE-2023-22655.<br />
Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.<br />
Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.<br />
Addressed an issue where the iSCSI SW ipv6 HDD could not be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address Type.<br />
Addressed an issue where setup options of the BIOS Configuration (RBSU) utility may not be synchronized to the latest state when a server is idle in RBSU for more than 30 minutes.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00_03-06-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.</p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.</p><p>Addressed an issue where NVME hot plug when installing fully loaded NVME drives.</p><p>Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.</p><p>Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.</p><p>Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when iSCSI IP Address Type option is set to “Auto” in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt > select Network device > IP Address Type.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ed9a4b98eb61471ab66480b22d4e9c4f" version="3989a6be781a44cb8efef57386a57f07" lucid_version="MB014000GWRTN_MB012000GWRTL_MB010000GWRTK_x64@HPG2(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f1e144df7ff3445292cda5ea1ed9d30c" version="6312b561ca864c9d9441b80eab6807a9" lucid_version="MB002000JWFVN_MB004000JWFVP_x64@HPD4(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a905a1ce40514e0aba7f765d4f2557ae" version="f1f5060bda3c4e5495746b97e7f7a0e5" lucid_version="MB012000GZYVT_MB014000GZYVU_MB016000GZYVV_x64@HPG4__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves data integrity.&nbsp;</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in certain error and timing conditions.&nbsp;</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide a minor performance improvement.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves data integrity</li>
	<li>Decreases&nbsp;possibility of data corruption in certain error and timing conditions</li>
	<li>Reduces the probability of hangs and provide a minor performance improvement</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ff420d2a518645bca112d4ae29440c26" version="15f9ed73fdcc45b8a3abaf832a12a769" lucid_version="MK000400KWDUK_VK000480KWDUE_MK000800KWDUL_VK00_x64@HPK4(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="799e6d2dd6574724a67dc3ea392d2873" version="9cf27027268b4790a610128cd7ed6025" lucid_version="Gen9_EXP.Lin@5.15(C)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.15" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support FIPS mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.15 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Support HPE ProLiant DL180 Gen10 Server &nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a294766010e4496a9a5cf2711f22fa84" version="50d4821735e146d08e7b4c47672888fd" lucid_version="U47.FWpkg@2.00_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.<br />
This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel&#39;s mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.&nbsp; This issue is not unique to HPE servers.<br />
Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.<br />
Addressed an issue where NVME hot plug when installing fully loaded NVME drives.<br />
Addressed a potential security vulnerability in some 3rd and 4th Generation Intel&reg; Xeon&reg; Processors when using Intel&reg; Software Guard Extensions (SGX) or Intel&reg; Trust Domain Extensions (TDX) may allow escalation of privilege, as documented in CVE-2023-22655.<br />
Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.<br />
Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.<br />
Addressed an issue where the iSCSI SW ipv6 HDD could not be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address Type.<br />
Addressed an issue where setup options of the BIOS Configuration (RBSU) utility may not be synchronized to the latest state when a server is idle in RBSU for more than 30 minutes.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.</p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.</p><p>Addressed an issue where NVME hot plug when installing fully loaded NVME drives.</p><p>Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.</p><p>Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.</p><p>Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt > select Network device > IP Address Type.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cf36f8009ed4464f93a208bf9c35b47b" version="647233deb2de4c3894772a706758dcd1" lucid_version="lpfc.sles15.x86_64_legacy@14.2.589.21(b)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="14.2.589.21" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>

<p>The Driver is FIPs Enabled</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p _msthash="125" _msttexthash="882999">The Driver Component is FIPs Enabled</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="14.2.589.21" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="03731a36570c4baca7e553d9af4e7172" version="0647f3b99e1b458d8fffa5267a286259" lucid_version="Gen10P_MR416i-a_FW_Esxi@52.26.3.5379__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="52.26.3.5379" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Test</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fix brick controller issue</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c94eb717d55e4213952a8c5723962404" version="ded94c1328244822bcbeb17e12527af4" lucid_version="U39.win.x64@3.10_02-22-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5c9d950d613945119a93065a8b8651f2" version="e1e6de8d66a941f5ac8fd7d21467341c" lucid_version="MO0200JEFNV_MO0400JEFPA_MO0800JEFPB_MO1600JEFP_x64@HPD3(I)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f70895575958452eb07b1ce4dc51500a" version="53d62a8329154ad3b96efb8ea14a5865" lucid_version="bnxt_roce.sles15sp4@228.0.133.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="228.0.133.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.0.130.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed a system crash issue observed on running RoCE and L2 IO with Virtual Function creation/deletion and triggering firmware error recovery.</li>
	<li>This product fixed a system crashed issue while running the RoCE hammer on Wh+ with 8K pertest and 8K graf work QP&#39;s.</li>
	<li>This product fixed an issue that RoCE driver took longer time than expected to close in PCIe-AER fatal error.</li>
	<li>This product fixed RoCE error recovery fails upon injecting error on Thor&nbsp;adapter with 32K qps ib_send_bw IO.</li>
	<li>This product disabled RoCE LAG support for Wh+.</li>
	<li>This product restriced RoCE resources for Wh+ adapters.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="01713b1febed4cc9a463023eeb2cf6ee" version="489aacec2e284d0bb44d75d161f26efc" lucid_version="MK000240GWKVK_MK000480GWJPN_MK000960GWJPP_MK00_x64@HPG5(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a rare link loss issue and adds enhancements for drive reliability.</li>
	<li>After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.</li>
	<li>The new drive bootloader code will be activated after the next drive power cycle.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8ebc8805a4344ec4a24a5c7109c6e07f" version="b35a13fd5b9b4e3496d39ac44915e4b6" lucid_version="MK000480GWXFF_MK000960GWXFH_MK001920GWXFK_x64@HPG3__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improve the FW about data mismatch after SPL issued.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f38004b166d42068a292e455179565f" version="3f988cabc5094be983be248e9ed14a8a" lucid_version="FWPKG_MK000480GYCNT_MK000960GYCNP_MK001920GYCNF@HPG3__fwpkg-drive_en"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Bug fixes for D3-S4520/S4620 2.5&quot; and M.2</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b0d91a06dd9c4473a208b93b1c088e41" version="390973d822954b628ed54ed22d968fa8" lucid_version="KCD6XVUL800G_KCD6XVUL1T60_KCD6XVUL3T20_x64@GPK7__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="GPK7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for BSOD issue due to SRIS misdetection and FW Commit command via PCIe VDM (MCTP OVER PCIe) timed out.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="GPK6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dd83343964ed4806840a86595ee2254d" version="34a19eee62b046688932b72f30add682" lucid_version="VO000960RWUEV_VO001920RWUFA_VO003840RWUFB_x64@HPD8__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for unrecovered errors which may occur on the targeted Blocks of Wear-leveling process when host issues Read command.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Reduced the occurrence probability of PMIC busy issue by stopping PLP capacity check to reduce i2c access to PMIC.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="17b00802f88a41f591cee6102caaf9d2" version="23e6d5b335564a1d8aeb8c2d172f88da" lucid_version="EG001800JWJNR_EG002400JWJNT_EG002400MXJQT_x64@HPDA(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDA" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="760adb908c054b5b910c54e6c4a5f9e4" version="64113c0e89804aa4b96d2a4aaf7e56f8" lucid_version="ixgbe.rhel8@5.19.6-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.19.6-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 8.8.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.19.6-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 8.8.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="189399e2f82a48ee85c54d779b410263" version="d6797922c8734861aa5b3a13bbd376af" lucid_version="EK0800JVYPN_EO1600JVYPP_MK0800JVYPQ_MO1600JVYP_x64@HPD7(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="21c71338fdf2430b8b41f3737620822c" version="0ccf4731bb8349899429cf7f07b6a7d7" lucid_version="skylake.win.x64@10.1.19006.8299(B)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.1.19006.8299" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.1.19006.8299" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Chipset driver update</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1aa231a863f54088aaed47c33f55bded" version="790d3aee4b944904bc22bb946c573ff7" lucid_version="qlbb.rhel9@8.74.0.1-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="8.74.0.1-1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supported for Red Hat Enterprise Linux 9 update 3.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fixes an issue where kernel panic with call trace in qedf_ctx_soft.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.72.5.0-1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixes an issue where the system hangs on getting vport stats.</li>
	<li>This product fixes an issue where the mfw version shows 0.0.0.0 on VM with out-of-box drivers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="effc199f67764de3b570f964be1aa0ce" version="10944ab0f1624c03ba36626d0ab3382d" lucid_version="IEGen10.win.x64@0.2.3.0(B)__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="0.2.3.0" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 0.2.3.0(B) contains updates to the firmware packaging and is functionally equivalent to ver. 0.2.3.0. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 0.2.3.0.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours. On some systems this could result in a brief drop in CPU utilization or network traffic lasting less than a second.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0.2.3.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours. On some systems this could result in a brief drop in CPU utilization or network traffic lasting less than a second.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="130da7feaa1d444b8b70a759892883b1" version="b38da917fcbc4363af0a1966efa03da9" lucid_version="nvmenmifix.gen10.win@1.1.0.0(F)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.1.0.0" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.1.0.0 (E)" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added SHA384 signature</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a893ea1028be45a18d3b23d1c1c00c64" version="89df1015ba32417ba6c51b9e43f26177" lucid_version="EG000300JWBHR_x64@HPD5(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="568141f535e3461e90494d5ac58c3991" version="528c9f969c62490fb842e1aa24c70d80" lucid_version="MK000480GWCEV_MK000960GWCFA_MK001920GWCFB_ESXi@HPG3(I)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cfe4c5a213fb4be397a8b588efd29cc1" version="272e8e5ca1904b7ea4cb80b05508a5a6" lucid_version="MB006000GWKGR_ESXi@HPG1(H)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="97b8f64d84c04c1a9c4048cae29b4037" version="0b156d4cafcb4a49bc4f3f938af30931" lucid_version="MB016000JXLBA_MB018000JXLAU_ESXi@HPD3__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed self-initiated resetting of drives under queue full handling situations</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="170e9646d84b43c984c43d017aedc665" version="1260e6b953db4f188dba0c49ee005eae" lucid_version="U34.fwpkg@3.10_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a7c3a5257c9f4348b57dbc8291097788" version="c55fc892cef640e282dfd10ea8253dbb" lucid_version="bnxt_roce.rhel9u2@228.0.133.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="228.0.133.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.0.130.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed a system crash issue observed on running RoCE and L2 IO with Virtual Function creation/deletion and triggering firmware error recovery.</li>
	<li>This product fixed a system crashed issue while running the RoCE hammer on Wh+ with 8K pertest and 8K graf work QP&#39;s.</li>
	<li>This product fixed an issue that RoCE driver took longer time than expected to close in PCIe-AER fatal error.</li>
	<li>This product fixed RoCE error recovery fails upon injecting error on Thor&nbsp;adapter with 32K qps ib_send_bw IO.</li>
	<li>This product disabled RoCE LAG support for Wh+.</li>
	<li>This product restriced RoCE resources for Wh+ adapters.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fae7c963a551489594d913b81c29f2a4" version="0ad6272ec9044be887c5a0e585ed4bce" lucid_version="PICGen10.FWPKG@1.1.4__fwpkg-power_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.1.4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>For HPE ProLiant Gen10 Plus servers, iLO5 version 2.55 or above is required to upgrade to this version.</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>Changed certain behaviors to avoid machine power failures when significant power consumption devices are introduced.</p>

<p><strong>Problems Fixed:</strong></p>

<p>None</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.1.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>For HPE ProLiant Gen10 Plus servers, iLO5 version 2.55 or above is required to upgrade to this version.</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>Changed certain behaviors to avoid machine power failures when significant power consumption devices are introduced.</p>

<p><strong>Problems Fixed:</strong></p>

<p>None</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f25420df1f7142d3a5eccbf213f27251" version="2b07b3c0803c4c55a6b4637a8cb51098" lucid_version="A47.win.x64@3.00_01-26-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:
/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.
This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.
This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-27-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.



This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision provides AMD's mitigation for security vulnerabilities for CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ce1fbf38afa940d590b86cded0a4b8a1" version="193f840793ad45928ff06d32f602a330" lucid_version="EH0600JDYTN_ESXi@HPD7(K)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1368ab3d45fb40b799c33ccbe297c322" version="afeb49af428043f68826b65fe5b472b1" lucid_version="u30.linux@3.10_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1e88e3b27b814bcdbc8dcf6390d324d1" version="138cef9f447e40b9919f2ae7797fb0f2" lucid_version="UBM4_FWPKG@1.24(F)__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="1.24" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>For Gen11 PR3 &amp; 2023 March MSB</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.24 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>For Gen11 PR1 usage.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="38437d438933420e8063d6e963ffd91f" version="8b069a519397451c947d782a6171d7b5" lucid_version="MM2000GEFRA_x64@HPG9(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG9" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG9 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7d855090560e4f85994eaba25e5477a5" version="d75648fa1eec416c8d9133707812b3b5" lucid_version="VO000960KWVBR_VO001920KWVBT_VO003840KWVBU_ESXi@HPK2(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5c045315a07d45779f552f6cb831a2b4" version="b4c2b59c36ce4642ba7da920d7f13a3f" lucid_version="MLNX_Ethernet_Only_NIC_FW_package.x64@1.0.20(A)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.20" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 2.42.5044 :</strong></p>

<ul>
	<li>779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)</li>
	<li>779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</li>
	<li>817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following device has been&nbsp;updated to 16.35.3006:</strong></p>

<ul>
	<li>874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</li>
</ul>

<p><strong>New Features and changes included in version 1.0.20(A):</strong></p>

<ul>
	<li>Version 1.0.20(A) has been recompiled to create the firmware RPM compatible with RPM LIB v4.14.2. As a result, this rebuild firmware version 1.0.20(A) can now be installed successfully on a node with FIPS enabled.</li>
</ul>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 2.42.5044 :</strong></p>

<ul>
	<li>779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)</li>
	<li>779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</li>
	<li>817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following device has been&nbsp;updated to 16.35.3006:</strong></p>

<ul>
	<li>874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="35cb34a457a347fd86df4f560cf6cf57" version="9ae0e48b4a3d4bbda1987cccf09e7274" lucid_version="MLNX_Ethernet_Only_NIC_MFT_FW_package.x64@1.0.6(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.6" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</li>
</ul>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following changes have been made&nbsp;in sub-version 1.0.6(B):</strong></p>

<ul>
	<li>Product rebuilt to support FIPS&nbsp;mode enabled OS environment.</li>
</ul>

<p><strong>The following changes have been made&nbsp;in sub-version 1.0.6(A):</strong></p>

<ul>
	<li>Product rebuilt to have the new SHA 384 signature.</li>
</ul>

<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.6 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</li>
</ul>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following changes have been made&nbsp;in sub-version 1.0.6(A):</strong></p>

<ul>
	<li>Product rebuilt to have the new SHA 384 signature.</li>
</ul>

<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c41c6d23d08b454ca2ee1c24f966683f" version="cba7eddbef6d4684b8f370a6a08b949c" lucid_version="MB001000GWCBC_MB002000GWCBD_x64@HPG6(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9d355b002f0f45528687c05a8ded7241" version="cf7e5075bb524d6aaa563642562cef81" lucid_version="qla2xxx.rhel9.x86_64_legacy@10.02.11.00-k1(b)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.11.00-k1" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>

<p>This Driver is FIPs enabled.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This Driver is FIPs enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.02.11.00-k1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 10.02.11.00-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5829ee37bc994558baa6a98dd52b6154" version="392c899d0a6c4704bc003599a76324de" lucid_version="EG000600JWJNP_EG001200JWJNQ_EG001200MXJQU_ESXi@HPD8-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="188764648e874fd98523f669c6e5a042" version="f212d35297b44651a69896a2c995c564" lucid_version="intel_cvl.w2k22@1.13.242.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.13.242.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.164.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of CVL4.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3f21d022915a4ce0a1c93f5b69a37bfe" version="f41a3b677c7145f685d488733b03c184" lucid_version="EO000400KYDKV_EO000800KYDLA_x64@HPK4(B)__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Reverted OCP spec features to maintain compliance to OCP spec commands over NVMe-MI</li>
	<li>Implemented real Active Measured Latency by adding&nbsp;OCP 2.0 C3 Log page</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="116d422873c94edd9b2d0af192be21c4" version="80bb0d1fc1d749c7a3f95621abd8d107" lucid_version="MK000400KWDUK_VK000480KWDUE_MK000800KWDUL_VK0_ESXi@HPK4(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b4be4739aaa741bf83254d24ca921fd7" version="5474427c817f45a28f4d441ef6a3a3a5" lucid_version="VK007680GWSXN_ESXi@HPG3(D)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a3ac88993616476a8dcf9b3fac5ea67c" version="9d421f9fa9654d18b25c022410fdc23a" lucid_version="nicfwupg_bcme.win64@5.4.0.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.4.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.3.8.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed PFC flood problem when shut down system while running RoCE traffic.</li>
	<li>This product addressed PCIeVDM communication problem between BMC and NIC after an error recovery.</li>
	<li>This product addressed the PHY level packet drop.</li>
	<li>This product addressed the problem of multi-cast traffic gets leaked to unintended functions.</li>
	<li>This product addressed the reporting mechanism of NCSI max temperature.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fb9faa50a5034cfe8c3861f763b25770" version="cebca22e7fd543358014961a43ef5bc0" lucid_version="ML30GEN10Plus_ME.win.x64@06.00.03.604__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="06.00.03.604" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/01/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2024.1 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="06.00.03.505" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="230d4b31fe374aebb4d538e99b933aee" version="c7143ff3d212431a9f1e49ad191b9bb0" lucid_version="MB012000GWDFE_x64@HPG3(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="87a7eb56c25b4c4c98ceb5ea24664524" version="d251d172c13b4eba9b09dc76f95443ee" lucid_version="HPE_MR216i-p_Gen10P@52.26.3-5379__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="52.26.3-5379" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>7.26 Patch Release Beta Drop</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fix brick controller issue.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="52.26.3-5250" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>DMTF PLDM Redfish Device Enablement enhancements
	<ul>
		<li>iLO5 2.99, iLO6 1.54 or later versions are required.</li>
		<li>Added support for Chassis Data Model
		<ul>
			<li>GET Storage[Links][Enclosures]</li>
			<li>GET Chassis</li>
			<li>GET DriveCollection</li>
			<li>GET Drive[Status][State]=Absent (include empty bays under Chassis.)</li>
			<li>GET Drive[Links][Chassis]</li>
			<li>Note1: Drive URL will change to /redfish/v1/Chassis/{Id}/Drives/{Id}</li>
			<li>Note2: The empty bay resource ID is generated using &lt;Encl ID in upper byte&gt;:&lt;Bay Number in lower byte&gt;</li>
		</ul>
		</li>
		<li>Added support for Fabric Data Model
		<ul>
			<li>GET Fabric, SwitchCollection, Switch, PortCollection, Port</li>
		</ul>
		</li>
		<li>Added support the following Redfish Events
		<ul>
			<li>DriveMissing</li>
			<li>DriveMissingCleared</li>
			<li>DriveOffline</li>
			<li>DriveOfflineCleared</li>
			<li>VolumeOffline</li>
			<li>VolumeOfflineCleared</li>
		</ul>
		</li>
		<li>Added support for the following Redfish Annotations
		<ul>
			<li>@Redfish.AllowableValues (patch and post)</li>
			<li>@Redfish.AllowablePattern (patch and post)</li>
			<li>@Redfish.AllowableNumbers (patch and post)</li>
			<li>@Redfish.WriteableProperties (patch only)</li>
			<li>Note1: Any property not listed in the writeable properties list does not contain any other annotation.</li>
			<li>Note2: For VolumeCapabilities[@CapacityBytes.AllowableValues], the range is set from 1GiB to a maximum possible value of the RAID0 volume size considering the same type of the available &lsquo;n&rsquo; number of unconfigured drives. The CapacityBytes in the POST is not validated against the range in the VolumeCapabilities as the RAID Type and the number of drives, strip size and so on matter.</li>
		</ul>
		</li>
		<li>Added support for Redfish AutoVolumeCreate
		<ul>
			<li>GET/PATCH Storage[AutoVolumeCreate]</li>
			<li>MR200 will return AutoVolumeCreate=NonRAID, which remains the same as earlier firmware versions.</li>
			<li>MR400 will return AutoVolumeCreate=Disabled. Any newly added drive into a MR400 will no longer automatically appear as a JBOD and the user must configure the drive before using it.</li>
		</ul>
		</li>
	</ul>
	</li>
	<li>Added support for UBM7 backplanes</li>
	<li>Update to 2023.1 schema bundle</li>
	<li>Improve Copyback disable handling while copyback is in progress on drives</li>
	<li>Support new PSoC 6 part information display.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix a00133433en_us: HPE Compute MR Gen11 and Gen10 Plus Controllers - Controllers On HPE ProLiant AMD Gen11 Servers and Gen10Plus Servers Do Not Support Microsoft Secured-Core and AMD DMA Remapping (DMAr)</li>
	<li>Fix a00133091en_us: Storage Information Might Be Lost in iLO When Drives Are Behind MR Controllers In Passthrough Mode</li>
	<li>Fix a00134330en_us: HPE MR Gen10 Plus/Gen11 Controller - Non-Volatile Memory Express (NVMe) Drive FWPKG Flash Through HPE Integrated Lights-Out (iLO) Does Not Reflect the New Firmware Version on the Storage Page</li>
	<li>Fix an issue that NVMe passthrough command may hang when getting log page over 1MB data</li>
	<li>Fix an issue that setting JBOD shows sucessful, but JBOD does not appear to be created when all the target IDs (0 to 239) are exhausted.</li>
	<li>Fix an issue that Log Sense page 0x15 fails on ACS-5 supported SATA drive</li>
	<li>Fix an issue that crashdump.txt is taking longer than 15s to generate for ondemand snapdump</li>
	<li>Fix an issue that some snapdump prints flood the uart</li>
	<li>Fix a rare issue that logical drive data might be corrupted when expected power loss happens in the completion of copyback operation.</li>
	<li>Fix a rare issue that snapdump might not finish collecting events and generate incomplete snapdump when power off system</li>
	<li>Fix an issue that BatteryOK RDE alert was logged after every AC power cycle of the server</li>
	<li>Fix an issue that predictive failure RDE alert for a drive was logged twice on a single server reboot or controller reset</li>
	<li>Fix an issue that drive count for the enclosure might not be correct when pulling all drives simultaneously.</li>
	<li>Fix an issue that PLDM firmware update on drive fails when there are different drive models are connected to the controller</li>
	<li>Fix an issue that firmware might crash when the UBM controller is in non operational mode</li>
	<li>Fix Volume schema property IOPerfModeEnabled to be always enabled since it is dynamically decided by the controller</li>
	<li>Fix an issue that RSOD occurs when selecting the Enclosure Management for MR416i-p from System Utility Menu in ML30 Gen10 Plus</li>
	<li>Fix an issue that firmware fault might occurs when Self-Test page request is sent to the low power mode NVMe drive</li>
	<li>Fix an issue that Battery Charging Redfish Event is not generating</li>
	<li>Fix an issue that Status is not updated for the Volume resource when copyback operation is in progress</li>
	<li>Fix a rare issue that firmware fault might be observed while removing the foreign drives from the configuration</li>
	<li>Fix an issue that empty JSON PATCH request from REST client results in incorrect HTTP error code</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="644b370c36714c6490fce699ffce22e9" version="faf3019994e84d11a7b2131cf400e93e" lucid_version="U37.fwpkg@3.10_02-22-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where Restore Manufacturing Defaults and Restore Defaults from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6973afa059034a93b5842e17d11d1b46" version="206ccfc78b874b469233b21aa1627396" lucid_version="MB012000GWDFE_ESXi@HPG3(D)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1065be4a2b444fe1b0060c3a91fcbde2" version="49eb3cfdfe454c2fb19daf87839f72c0" lucid_version="ixgbevf.rhel9@4.18.7-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.18.7-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.18.7-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e342292c188e4979906efca874d47010" version="4d51771449e54ca6b6d9e32e386782fe" lucid_version="EO000400KYDKV_EO000800KYDLA_x64@HPK4(B)__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Reverted OCP spec features to maintain compliance to OCP spec commands over NVMe-MI</li>
	<li>Implemented real Active Measured Latency by adding&nbsp;OCP 2.0 C3 Log page</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7f5cc2735e814d67a516e6e72cb03eec" version="3434843304974150bfdc77062f3e34b0" lucid_version="SmartPqi.win@1010.84.0.1012__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1010.84.0.1012" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>SR 2.8.2/SR 3.3.2 Drop1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1010.74.0.1020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2c8de2e408714be7a3117529d7da4ca9" version="6e13a253fb43432090b01f70e023c9e6" lucid_version="ice.rhel8@1.12.6-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.12.6-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports linux command to split port.</li>
	<li>This product now supports MSI-X vector allocation tuning by sysfs.</li>
	<li>This product now supports limiting the Maximum Bitrate for a Transmit Queue.</li>
	<li>This product now supports generic binary RPM starting from Red Hat Enterprise Linux 8.8.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue where the Linux Firmware&nbsp;update results in system hangs.</li>
	<li>This product correct an issue where when using certain DDP package versions, 802.1ad type VLANs might not be correctly enabled on SIOV or SR-IOV interfaces.</li>
	<li>This product correct a ptp4l kernel crash and several ptp related issues.</li>
	<li>This product correct an issue where the ice driver fails to remove the GNSS module properly on driver unload, resulting in a kernel panic.</li>
	<li>This product correct an issue where running traffic via Open vSwitch.</li>
	<li>This product correct an issue where a performance issue caused the GNSS write commands to be delayed and not delivered until the next commands appeared.</li>
	<li>This product correct an issue for Linux ice driver v1.7.16+ on E810 four-port devices where VF could not be created on certain high-core count platform.</li>
	<li>This product correct an issue where unloading a driver without a DDP profile would disable PF interfaces.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.6-1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports linux command to split port.</li>
	<li>This product now supports MSI-X vector allocation tuning by sysfs.</li>
	<li>This product now supports limiting the Maximum Bitrate for a Transmit Queue.</li>
	<li>This product now supports generic binary RPM starting from Red Hat Enterprise Linux 8.8.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue where the Linux Firmware&nbsp;update results in system hangs.</li>
	<li>This product correct an issue where when using certain DDP package versions, 802.1ad type VLANs might not be correctly enabled on SIOV or SR-IOV interfaces.</li>
	<li>This product correct a ptp4l kernel crash and several ptp related issues.</li>
	<li>This product correct an issue where the ice driver fails to remove the GNSS module properly on driver unload, resulting in a kernel panic.</li>
	<li>This product correct an issue where running traffic via Open vSwitch.</li>
	<li>This product correct an issue where a performance issue caused the GNSS write commands to be delayed and not delivered until the next commands appeared.</li>
	<li>This product correct an issue for Linux ice driver v1.7.16+ on E810 four-port devices where VF could not be created on certain high-core count platform.</li>
	<li>This product correct an issue where unloading a driver without a DDP profile would disable PF interfaces.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="211fcef09ace432ba1e1c0cdad640eeb" version="d961aeb497644a2a9f693b7c229ed841" lucid_version="EG000300JWFVB_x64@HPD3(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ffc5db5b28504df99cd08b4bf08ccc7d" version="ee7d3d336a944030a5e30732a60cfa80" lucid_version="SPSGen10.Win.x64@04.01.05.002__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="04.01.05.002" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="04.01.04.901" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.1 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="75bc856a96a1425a954558bdb79908f8" version="a1934a989a4840b288c2513ca726330d" lucid_version="VK000480GWSXF_VK000960GWSXH_VK001920GWSXK_x64@HPG3(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bafc8d47aead420a9621e8d49861aa9b" version="c186d1cb5f0d43489d18d65055617372" lucid_version="a43.fwpkg@3.00_01-26-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.

This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.

This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.

This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-27-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.



This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision provides AMD's mitigation for security vulnerabilities for CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2e58b72d90ee4595851925dd371b1254" version="96fd6d5982ef41f5b26c866fcb3fced7" lucid_version="lpfc.rhel8.x86_64_legacy@14.2.589.21(b)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="14.2.589.21" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>

<p>The Driver is FIPs Enabled</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p _msthash="125" _msttexthash="882999">The Driver Component is FIPs Enabled</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="14.2.589.21" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ab364e800d5a4bd7ac986dedcc024c1b" version="a1eaa64db0c2416981afea5c37db2971" lucid_version="bnxt_roce.rhel9u1@228.0.133.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="228.0.133.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.0.130.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed a system crash issue observed on running RoCE and L2 IO with Virtual Function creation/deletion and triggering firmware error recovery.</li>
	<li>This product fixed a system crashed issue while running the RoCE hammer on Wh+ with 8K pertest and 8K graf work QP&#39;s.</li>
	<li>This product fixed an issue that RoCE driver took longer time than expected to close in PCIe-AER fatal error.</li>
	<li>This product fixed RoCE error recovery fails upon injecting error on Thor&nbsp;adapter with 32K qps ib_send_bw IO.</li>
	<li>This product disabled RoCE LAG support for Wh+.</li>
	<li>This product restriced RoCE resources for Wh+ adapters.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a5171f3139984425bf9198e9019c91db" version="65a717973d3a446287ba007485214362" lucid_version="mlnx_mft.sles15sp4.x86_64.rpm@4.26.1-3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.26.1-3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.24.0-72" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="be8e1065c14f4a6883e7804dae8c691e" version="ba5a2b2cb4af422285be9fa7222a0193" lucid_version="a43.linux@3.00_01-26-2024(B)__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 3.00_01-26-2024.</p>

<p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors. This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors. This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers. This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575. This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_01-26-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors. This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors. This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers. This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575. This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d7cf155e76584b1f8fb8e3c7c222c90d" version="22244db763a0429298b5baaf94887371" lucid_version="MB008000GWRTC_x64@HPG1(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="787f189347ac420fbe52f5e6292d569d" version="ad1f8a3d5e9a4aac968b9afa6a1811e5" lucid_version="MB004000JWKGU_ESXi@HPD2(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9fd1abd8973f4c09aa450e541dc4ee41" version="def92d407a1c4a9887c9e306f7d8728e" lucid_version="VO000960RWUEV_VO001920RWUFA_VO003840RWUFB_x64@HPD8__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for unrecovered errors which may occur on the targeted Blocks of Wear-leveling process when host issues Read command.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Reduced the occurrence probability of PMIC busy issue by stopping PLP capacity check to reduce i2c access to PMIC.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f148b53c7b96447699a0d01706827644" version="3894cc6e9fa1474fbec9f21f977caaae" lucid_version="MLNX_IB_Only_CX4_CX5_HCA_FW_package.x64@1.0.13(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.13" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes are included in product version 1.0.13(B):</strong></p>

<ul>
	<li>Product rebuilt to support FIPS&nbsp;mode enabled OS environment.</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)<br />
	&nbsp;</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 16.35.3006:</strong></p>

<ul>
	<li>872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)</li>
	<li>872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The subversion 1.0.13 (A) of the product&nbsp;has fixed the issue of smart component having been built with an incorrect payload.</p>

<p>&nbsp;</p>

<p><strong>Fixes in version 12.28.2006:</strong></p>

<ul>
	<li>Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an&nbsp;issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.13 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)<br />
	&nbsp;</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 16.35.3006:</strong></p>

<ul>
	<li>872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)</li>
	<li>872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The subversion 1.0.13 (A) of the product&nbsp;has fixed the issue of smart component having been built with an incorrect payload.</p>

<p>&nbsp;</p>

<p><strong>Fixes in version 12.28.2006:</strong></p>

<ul>
	<li>Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an&nbsp;issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="82cd9f1b504a4d3798c759e1d18439aa" version="404bfb28bfe04dcab5591ad64695ace8" lucid_version="MO0400JFFCF_MO0800JFFCH_MO1600JFFCK_x64@HPD9(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ae6b2b73e1ee45bc9e25c451f9dd6d2f" version="1236f03d9f1f424e80c36dec261b0361" lucid_version="MB012000GZYVT_MB014000GZYVU_MB016000GZYVV_x64@HPG4__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves data integrity.&nbsp;</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in certain error and timing conditions.&nbsp;</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide a minor performance improvement.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves data integrity</li>
	<li>Decreases&nbsp;possibility of data corruption in certain error and timing conditions</li>
	<li>Reduces the probability of hangs and provide a minor performance improvement</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0883e4abd7344c9b834b5e5585107933" version="6aacec93e5db4183a46951129c7b5dae" lucid_version="Gen10P_Gen11_StorCLI.linux@007.2613.0000.0000-rev1__pubsw-linux_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="007.2613.0000.0000" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Support autoconfig command.</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<strong><em>storcli /cx set autoconfig = &lt; none | JBOD &gt;</em></strong></p>

<ul>
	<li>Added a new option [ReuseTargetId] to add vd command. If &quot;ReuseTargetId&quot; is mentioned in the add vd command, the FW will allow reusing of TargetIDs without 120 seconds delay.</li>
	<li>Added support for UBM7 backplanes.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="007.2613.0000.0000" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>New release for version 007.2613.0000.0000.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b9a8e50fea15459f9f236f2538fb4a07" version="2a6784f0d9a249c980bd42cf081ef2bc" lucid_version="b57.win64@221.0.5.0(D)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="221.0.5.0" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="221.0.5.0 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addressed the INF install section to include correct WOL settings.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4d6b330d7f1d4462bea2b4b6ff4f5e4a" version="4eef149ab26f41b89825f794cb8d3851" lucid_version="EG1800JEHMD_ESXi@HPD6(L)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (L)" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5ac3ee90b2184fa9828f960cd9d17840" version="c3d8ff86b8d9410bbed8bf12c64ecd33" lucid_version="EG000600JWJNP_EG001200JWJNQ_EG001200MXJQU_x64@HPD8__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>​​Firmware adds support for new humidity sensor</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="05f0508175404d989c50e4f9a4e09a23" version="859d00ecc6944740bca38a3a8eb33a01" lucid_version="IEGen10.Linux@0.2.3.0(D)__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="0.2.3.0" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 0.2.3.0(D) contains updates to the firmware packaging and is functionally equivalent to ver. 0.2.3.0. It is not necessary to upgrade with Revision D if a previous component revision was used to upgrade the firmware to version 0.2.3.0.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours. On some systems this could result in a brief drop in CPU utilization or network traffic lasting less than a second.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0.2.3.0 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 0.2.3.0(C) contains updates to the firmware packaging and is functionally equivalent to ver. 0.2.3.0. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 0.2.3.0.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours. On some systems this could result in a brief drop in CPU utilization or network traffic lasting less than a second.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ab1694a2c3b34d68b6e9d41c15960bf5" version="136f39a408504893a4791ffa079269df" lucid_version="ixs.w2k19@4.1.251.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.251.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1.246.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation library ixsmsg.dll.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="58f3059c65eb403984076353b9f058af" version="6a096a7dd5a2497ca78ca69664547f13" lucid_version="FWPKG_MO000960RXRQK_MO001920RXRRH_MO003840RXRRK@HPD3__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Latest firmware updates including one assert fix, power, and power cycle enhancements.</li>
	<li>Initial firmware release for model VO007680RYEWD, 7.68TB drive.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9955e8989d3a49ccb377a1c01a7b8a6c" version="d2b6393725654c6cb750ab42ad9a4fd8" lucid_version="EG001800JWJNR_EG002400JWJNT_EG002400MXJQT_x64@HPDA(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDA (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="73ec3bde4c824e4abd7a12e09eb4bcb4" version="95a3cc2109ff4b50a7df9e0acce99b3c" lucid_version="EG000600JWJNP_EG001200JWJNQ_EG001200MXJQU_x64@HPD8(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1b2f6dbb532f4c6ca53c07209cbe6b16" version="079b1660fc44443faf5fa19f2c6a5692" lucid_version="qfle3.vmware80@2024.03.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with VMware firmware component 1.3.4.0.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with Firmware</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="39b3bcd8f8b243ad9879002d6ba846cc" version="7e53623fd1c34a10bbcfade4a8e07ef6" lucid_version="qlbb.sles15@8.74.0.1-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="8.74.0.1-1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fixes an issue where kernel panic with call trace in qedf_ctx_soft.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.72.5.0-1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>&nbsp;This product fixes an issue where the system hangs on getting vport stats.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e951bbca527f4f9f8a089c23c99574fe" version="9db8244946c04f0f84d6e822e9164e93" lucid_version="vxs.w2k22@2.1.246.0(B)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.1.246.0" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which the component can&#39;t read the current driver version.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.1.246.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which fixes NumberOfIndirectionTableEntries assignment to the correct value during HLK certs test.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="03c87662bb3a4a57a852807a8f77de3f" version="2a84d544455f46db85163322c5413c78" lucid_version="IEGen10Plus.Linux@1.0.0.22(D)__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.0.22" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.0.22(D) contains updates to the firmware packaging and is functionally equivalent to ver. 1.0.0.22. It is not necessary to upgrade with Revision D if a previous component revision was used to upgrade the firmware to version 1.0.0.22.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.22 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.0.22(C) contains updates to the firmware packaging and is functionally equivalent to ver. 1.0.0.22. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 1.0.0.22.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="49ef8a3b84714e97bc36564b7cd48c52" version="99754f4633a34a6b9067b7595e5882a7" lucid_version="VK000240GXAWE_VK000480GXAWK_VK000960GXAWL_x64@HPG1(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3708e2f65daf47b8aa8844b8d2ad97a1" version="379544dbbe0444eb9d6377f1fdff9fc5" lucid_version="mlnx_en_roce_mlx5.sles15sp4.x86_64.rpm@23.10-1.1.9.1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="23.10-1.1.9.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>No changes or new features included in version 23.10-1.1.9.1.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 23.10-1.1.9.1:</strong></p>

<ul>
	<li>An error was triggered in case devlink reload was attempted when there were allocated subfunctions.</li>
	<li>Changing the steering mode to firmware steering was unsupported for policy IPsec rules.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="23.04-1.1.3.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following&nbsp;changes and new features have been included in version 23.04-1.1.3.1</strong></p>

<ul>
	<li>Starting this release, MLNX EN+RoCE&nbsp;drivers will adopt the following versioning naming scheme: YY.MM-x.x.x.x (i.e., Year.Month-x.x.x.x).</li>
	<li>Added support for allowing the host to track various statistics for the VFs, specifically all of the Q_counters stats even if he gives the VF to a VM, through the representor Q_counters for the VF which are now exposed over the host.</li>
	<li>With this feature, a kernel error log is now generated when certain fatal QP errors occur.</li>
	<li>Added support for the following operating systems:
	<ul>
		<li>RHEL 9.2</li>
		<li>RHEL 8.8</li>
		<li>SLES15-SP5</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 23.04-1.1.3.1:</strong></p>

<ul>
	<li>Installing &quot;mlnx_tune&quot; on Python3 did not work properly. &quot;mlnx_tune&quot; now supports Python3 in addition to Python2.</li>
	<li>Changing traffic class via the sysfs while modifying QPs in parallel caused a deadlock.</li>
	<li>Due to a bug in the emulation layer, performance degradation was experienced when running GPUDirect over Virtual Functions.</li>
	<li>&quot;debugfs&quot; directories could not be created for representors and sub-functions, thus the log showed error for both the scenarios.</li>
	<li>&quot;knem&quot; did not fully support RHEL8.7 and newer releases.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="33bf4058d2284d31ad166fd3619cf008" version="a68dccf254d84dda93baa61b13982ff3" lucid_version="MB014000JWTFD_MB012000JWTFC_ESXi@HPD8(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="683278c3722a411eb75e30e9eb4f543d" version="e453eb3c03e24f28b6f6d755df601bea" lucid_version="intel_vf.w2k19@1.14.201.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.14.201.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.13.8.0 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports HPE ProLiant Gen11 Platforms with Intel processors</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c046b36cf8a0464e9240313acab20b06" version="f20c8492762045838538e5196ba78460" lucid_version="MicroServerv2GEN10Plus_ME.linux@06.00.03.604__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="06.00.03.604" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/01/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2024.1 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="06.00.03.505" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Important Notes:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Firmware Dependencies:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">None</p>

<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Enhancements/New Features:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">This version is in compliance with IPU.2023.3 guidance.</p>

<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Known Issues:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="17203fd912204cbc96571639dbe02ea0" version="9519c7851fad4262a181b0029324d039" lucid_version="MB010000GWZGT_MB012000GWZGU_MB014000GWZGV_x64@HPG1(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f18fb22c5eab4952b3cc28771ba83857" version="3b65ce122f324c5d81a07bdc96df2758" lucid_version="MB010000GYDKP_MB012000GYCJL_MB014000GYCJT_x64@HPG2__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Update maximum continuous operation temperature values for host thermal management and reporting.</li>
	<li>Assert fixes, logging enhancements and all current firmware improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b0150fa8c3c74fa8a3415a136a3cc117" version="e7a2f0e157dd413d9e4c402a2d7aee95" lucid_version="nicfwupg_bcm_open.win64@5.4.0.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.4.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports GetPackageStatus NCSI Command.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.3.6.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed abnormal fan behavior when BCM5719 OCP3 installed.</li>
	<li>This product addressed the failure of IP dispatch when using BCM5719 LOM as shared iLO networking.</li>
	<li>This product addressed that platform might encounter a POST failure when NX1-based controllers and some storage controllers combines.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4025ccc149b544568897af8cffe102f9" version="ed0ac4ef32ea476ca5c96032ce78f81e" lucid_version="MK000480GWSSC_MK000960GWSSD_MK001920GWSSE_ESXi@HPG3(E)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3fba85b34f854c9b9b5bb51030ba5e41" version="2e322f2f33bb4e5b96705322d32a2583" lucid_version="MB006000JWKGN_ESXi@HPD2(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2f7da3629806488ebbb800b74a44db9d" version="a395024a634f4eaf95ae631cdd647d78" lucid_version="VK000240GXAWE_VK000480GXAWK_VK000960GXAWL_ESXi@HPG1(D)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c02f997871554705a1c6e597965673df" version="11b75d1df13642abaf1d710ec838bcd1" lucid_version="U37.Linux@3.10_02-22-2024__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where Restore Manufacturing Defaults and Restore Defaults from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="12eaa829eeb841af89f7ea134993346e" version="6e456a0673704a7da8c057fca47343b1" lucid_version="MO001600KWVNB_MO003200KWVNC_MO006400KWVND_x64@HPK3(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a25f1000baab4c289a20555c0f1143b1" version="5998bc5753de4895aa9adb6c88889b18" lucid_version="MB010000JWZHA_MB012000JWZHB_MB014000JWZHC_x64@HPD4(B)-rev1__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Addresses a hot plug reporting concern</li>
	<li>Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration</li>
	<li>Remove Background Media Scan (BMS) with Super parity and Directed Offline Scan (DOS)</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Addresses a hot plug reporting concern</li>
	<li>Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c4ff2ade728c42bfb931931df173daf9" version="09772d0ca16a4a018fa017e8d5197cde" lucid_version="SPSGen10.fwpkg@04.01.05.002__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="04.01.05.002" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="04.01.04.901" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.1 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="97376eb681cc4681a46dc573b80df4a8" version="a2bd1334a3d24406bd7019185521df65" lucid_version="Gen10P_MR416i-p_FW_Esxi@52.26.3.5379__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="52.26.3.5379" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Test</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fix brick controller issue</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a6fc6d419cd14563aeefb1d3f50c589e" version="da4ca0ef911449eabdd56ff55bd9b062" lucid_version="U61.Win.x64@2.00_02-01-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p>Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI ASPM to Disabled/L1 Enabled.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Added "DMI Power Management (ASPM)" option in RBSU. The option has the default value of "disable", which will override default setting of "enable" from the previous ROM. This is due to enabling DMI power management might result in system hang with machine check exception based on Intel erratum RKL-15.</p><p>The path to the option is: Processor Options -> DMI Power Management (ASPM)</p><p></p><p>This setting has the Redfish property URI of: /redfish/v1/systems/1/bios/settings/E3DmiAspm</p><p></p><p>To follow DMTF schema, change the Redfish registry version naming to have the pattern of "^\d+.\d+.\d+$".</p><p>For example, /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will now becomes /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.4 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2023-23583. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.1.1v update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dc8e1d549b6c46c4a9bd046b4dd1950e" version="d0d00c9e6e934d92827b708571a6318a" lucid_version="EH0600JDYTN_x64@HPD7(K)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ba1b35ce71154e9e8335778f038c2885" version="261aafdc51bc44d1afeb34d13461c1c3" lucid_version="MB014000JXUCC_x64@HPD4(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>High Security Enablement support FIPs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Firmware contains fix for bug that may cause drive to perform self-initiated reset in systems where maximum queue depth of 128 is exceeded.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dcf87aae93de4d649fef4547bffe751a" version="7fe35878e6ca438f9a084a3c6cbd7423" lucid_version="MLNX_VPI_CX6_HCA_MFT_FW_package.x64@1.0.12__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.12" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 20.40.1000:</strong></p>

<ul>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21</li>
</ul>

<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>No New features or changes have been included in version 20.40.1000.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.40.1000:</strong></p>

<ul>
	<li>RDE LLDPTransmit ChassisID was occassionally not represented correctly.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.11" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 20.37.1700:</strong></p>

<ul>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21</li>
</ul>

<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 20.37.1700:</strong></p>

<ul>
	<li>A new capability enables the VM to track and limit its Vport&#39;s activity. This is done using the new q_counters counter which enables aggregation of other Vport&#39;s from PF GVMI.</li>
	<li>Updated the link maintenance flow to avoid high uncorrectable error rate.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No new fixes have been included in version 20.37.1700</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cd7426f38f994cdda68f5e95f6cadf0f" version="4ec90c00c1b044af86ebc7e52653510c" lucid_version="VO000960KWVBR_VO001920KWVBT_VO003840KWVBU_x64@HPK2(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>
	<p>This component provides support only for VMD enabled Intel VROC platform</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="63a556e6179b4101ae6472eac493f29b" version="9a83c8bf03404a54a998d2423ae51c63" lucid_version="emulex_linux_smartsan_enablement@1.0.0.0-4(p)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.0-4" revision="p" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.0-4</p>

<p>This Component is FIPs enabled.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This Component is FIPs enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.0-4 (o)" revision="o" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.0-4</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="121ced484e6647bf98b3a4bca60530c2" version="352e95672d994388af55345a156b3fad" lucid_version="VK003840GWSXL_x64@HPG3(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a4fb8dc02faf478a85519ccf77530c6a" version="b88681bd41fd4d2592d10a9761286b28" lucid_version="VK000480GWTHA_VK000960GWTHB_VK001920GWTHC_ESXi@HPG4(B)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d5dd0878f5bc46a1b2bda19d450bbffe" version="59174affe0294b9aae6fca3a433dd5e2" lucid_version="FWPKG_MO001600PXMTN_MO003200PXMTV_MO006400PXMUA@HPD2__fwpkg-drive_en"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix issue that for commands that have reported errors to the host, change FW so that new commands are registerd after FW performs abort process for the corresponding command in the command management table</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f74d125372264713b4a9d8ebea70260d" version="852a9b28c00b4087a09dcbfc785167e8" lucid_version="a42.win.x64@3.00_01-26-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.

This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.

This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.

This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-27-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.



This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision provides AMD's mitigation for security vulnerabilities for CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3207ab7da97d4b129737d7c53c2ebb76" version="708fb71e5fa04e9c8224ae053fe9da5f" lucid_version="VO007680JWCNK_VO015300JWCNL_x64@HPD8(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="33474bdb31ec42199bc00637b81a4d15" version="9e2b4b69ba0743aba76382bc3c7f1957" lucid_version="D8000.fwsc.win_x64@0130(C)__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="0130" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Smart Array reporting &quot;Storage Enclosure FW upgrade Problem Detected&quot;.</li>
	<li>PSU version is showing as &quot;No Ver&quot; after inserted the New bel power PSU.</li>
	<li>GEM_5_2 Coverity defect fix.</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v234513/20-D8000-Gen10RN0130B_ED3.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0130" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Smart Array reporting &quot;Storage Enclosure FW upgrade Problem Detected&quot;.</li>
	<li>PSU version is showing as &quot;No Ver&quot; after inserted the New bel power PSU.</li>
	<li>GEM_5_2 Coverity defect fix.</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v218471/20-D8000-Gen10RN0130_ED1.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="423cc31f15944616b9452d63683a53fd" version="77255601cb3f4c36984e0e080c5a70b7" lucid_version="VO003840XZCLT_VO007680XZCMB_MO000800XZCLQ_ESXi@HPD2(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for SAS core dump issue in specific configuration.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="26ad6199e9ca4196942c2e37e82e08a2" version="0c9b087ad7d944d1add840ea49921f1a" lucid_version="VK003840GWSXL_x64@HPG3(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1f91b74faf084255b33a9e102dcf221d" version="8fcb4119bc324bc58df1935b0a33036c" lucid_version="U45.Linux@3.10_02-22-2024__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_10-19-2023 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where Restore Manufacturing Defaults and Restore Defaults from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bc640709bf9a4728898e83ba80473c0a" version="08305877495b4f339adad183e8fdb4c7" lucid_version="MT001600KWHAC_MT003200KWHAD_MT006400KWHAE_ESXi@HPK2(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4cf79b782386458fa01aea2ca94f4962" version="2668d39e0fbf4e18b5fa254aab929c4a" lucid_version="MM1000JEFRB_MM2000JEFRC_x64@HPDA(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDA (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8adb99f8960b4849ba6664217211b8d2" version="6a912a1aae9f45218bf8d095b9d9b92e" lucid_version="VO002000KWVVC_VO004000KWVUR_MO001600KWVUU_x64@4ICRHPK3(H)__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4ICRHPK3" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4ICRHPK3 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA <a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="142d96d331a04f9e847ceeb66ad042c6" version="4fa45bfc77ee4c14a0a6ded2305907ee" lucid_version="ET000750KWJTF_EO000750KWTXC_EO000375KWJUC_x64@4ICSHPK4(F)__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4ICSHPK4" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4ICSHPK4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="923bb6bba3254a6d80257c1bf056f39d" version="8144cf86cc1e4b73bab7cffe1baaa208" lucid_version="UBM6_FWPKG@1.04__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="1.04" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Fix GHC issue</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.02 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support Gen11 Intel servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fdd1b58860474c42b7f3b1b7524af387" version="7793c00facb34c03a4c9c952b68f6b5a" lucid_version="VO000960KXAVL_VO001920KXAVP_VO003840KXAVQ_x64@HPK5(E)__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK5 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed an incompatibility issue in MCTP over PCIe VDM function</li>
	<li>Updated WCTEMP value for thermal throttling threshold</li>
	<li>Fixed CA <a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00130699en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00130699en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b6cb1e645c374b3e92e6a0688121990e" version="57c4a470e34f4136924a13974fd81d52" lucid_version="EG000300JWSJP_EG000600JWJNH_EG001200JWJNK_ESXi@HPD5(C)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="be75bc90ea544ceea229c5a0eeef825c" version="b92d5140310447c395d66b3ee5a805fd" lucid_version="MB1000GDUNU_MB2000GDUNV_MB3000GDUPA_MB4000GDUP_x64@HPG4(N)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="N" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (M)" revision="M" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dc2f3874388f4d969828a39097a550e8" version="a693edbb0bb944a496bd5a9f03b75096" lucid_version="VO0480JFDGT_VO0960JFDGU_VO1920JFDGV_x64@HPD9(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9635a1b56d544167b79937e43283b144" version="f94ab1189855416bb5f77a520ad658bd" lucid_version="MB1000GDUNU_MB2000GDUNV_MB3000GDUPA_MB4000GDU_ESXi@HPG4(M)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="M" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (M)" revision="M" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e3abad55c63d42f3bfc00d8212a8e9d4" version="163f9a9c09114dca86609dff8442ec80" lucid_version="EH000900JWHPK_EH000600JWHPH_x64@HPD8(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine &ldquo;sweeping&rdquo; of the media surface.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d287970503c042a480f1860ec2c054c7" version="1fc5487720d045589d8ae14e888f79d6" lucid_version="MB016000JXLBA_MB018000JXLAU_x64@HPD3(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>High Security Enablement support FIPs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Firmware contains fix for bug that may cause drive to perform self-initiated reset in systems where maximum queue depth of 128 is exceeded.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7943f29050984f1f850b2530e1fd78f4" version="3ab833fb555e4108a6b0f5636a829c75" lucid_version="Intel_OPA_HFI_FW_package.x64@1.12.0(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.12.0" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes are included in version 1.12.0(B):</strong></p>

<ul>
	<li>Product rebuilt to support FIPS&nbsp;mode enabled OS environment.</li>
</ul>

<p><strong>No changes and new features in version 1.12.0</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
</ul>

<p><strong>Fixes included in version 1.12.0:</strong></p>

<ul>
	<li>Fixed race condition between BIOS checking link status and LNI completing which resulted in PXE boot failures.</li>
	<li>Changed the default behavior of the hfi1_eprom tool to convert the eprom format to version 2, eliminating the need to supply the -N command line argument.</li>
	<li>Addressed an issue where updating the HfiPcieGen3Loader*.rom file could result in the erasure of HfiPcieGen3Loader*.efi and HFI_TYPE1*.dat files.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.0 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>No changes and new features in version 1.12.0</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes included in version 1.12.0:</strong></p>

<ul>
	<li>Fixed race condition between BIOS checking link status and LNI completing which resulted in PXE boot failures.</li>
	<li>Changed the default behavior of the hfi1_eprom tool to convert the eprom format to version 2, eliminating the need to supply the -N command line argument.</li>
	<li>Addressed an issue where updating the HfiPcieGen3Loader*.rom file could result in the erasure of HfiPcieGen3Loader*.efi and HFI_TYPE1*.dat files.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d1014161143144dea5631e9b65f9f0d4" version="5a1ddc8855f6407192d4191d8e0982af" lucid_version="EG001800JWJNL_EG002400JWJNN_ESXi@HPD5(C)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b271ca95088c47b0b57cf56bd9562a4c" version="889ef6de3a3a40f6bdebd0ec8598b610" lucid_version="VO003840XZCLT_VO007680XZCMB_MO000800XZCLQ_x64@HPD2(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for SAS core dump issue in specific configuration.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="65980a419afd45d6b2067bb6166a4282" version="f575cace98a24b57a8eeb6fde548a1cd" lucid_version="VO001920KYDMT_VO003840KYDMV_MO001600KYDMU_ESXi@HPK5__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Prioritize disabling Non-Fatal Error reporting at the beginning of FLR processing</li>
	<li>Fix known FW bug PI/CI indexing issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix bugs found in the previous version and improve on TTR (Time To Ready) requirement to fix device temporarily not found issue after hot-plug.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aacf76bfa7674de086e8a84063eadb98" version="41201a5bde5d4757b307573a5478ced5" lucid_version="DL20ML30GEN10SPS.fwpkg@05.01.04.913__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.913" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with Intel IPU.2023.3 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.804" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.1 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3702e2a6624243b4a85fa9ca1f4c0ce2" version="f1d6657428544db9b0ccb63fbf3ef1bc" lucid_version="a48.win.x64@3.00_01-26-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:
/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.
This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.
This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.80_07-31-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new System Configuration (RBSU) configuration options that allow enabling L1 IO Drop Chain Enable to drop chain write support to avoid unexpected timeouts due to under certain conditions, some high-bandwidth PCIe devices could fail to complete the transaction.</p><p>In System Configuration (RBSU), the option is located under L1 IO Drop Chain Enable in Service Option when the system is with AMD 3rd Generation EPYC processors.
This setting has the following Redfish properties.
/redfish/v1/systems/1/bios/oem/hpe/service/settings/DropChainedWrite</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for AMD 2nd Generation EPYC processors. 

This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision provides AMD's mitigation for security vulnerabilities for CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.1.1u update which provides mitigation for security vulnerabilities documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.</p><p>Addressed an issue where Secure Boot would not be enabled when loading manufacturing default from iLO web.</p><p>Addressed an issue where RSOD would occur when entering "System Information" from RBSU under legacy mode.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5f15a26843724cddbeb0234b8805431e" version="f0f30eff9f0049b0b82c0cf40ffc8123" lucid_version="qlogic.online.fw.esxi70_rt@2023.10.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR">Adapter</p>
			</td>
			<td>
			<p dir="LTR">Speed</p>
			</td>
			<td>
			<p dir="LTR">MBI</p>
			</td>
			<td>
			<p dir="LTR">Firmware</p>
			</td>
			<td>
			<p dir="LTR">UEFI</p>
			</td>
			<td>
			<p dir="LTR">Boot Bios</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.09.07</p>
			</td>
			<td>
			<p dir="LTR">09.14.01</p>
			</td>
			<td>
			<p dir="LTR">7.36</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.09.07</p>
			</td>
			<td>
			<p dir="LTR">09.14.01</p>
			</td>
			<td>
			<p dir="LTR">7.36</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.09.07</td>
			<td>09.14.01</td>
			<td>7.36</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.09.07</td>
			<td>09.14.01</td>
			<td>7.36</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR">Adapter</p>
			</td>
			<td>
			<p dir="LTR">Speed</p>
			</td>
			<td>
			<p dir="LTR">MBI</p>
			</td>
			<td>
			<p dir="LTR">Firmware</p>
			</td>
			<td>
			<p dir="LTR">UEFI</p>
			</td>
			<td>
			<p dir="LTR">Boot Bios</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.08.05</p>
			</td>
			<td>
			<p dir="LTR">09.12.01</p>
			</td>
			<td>
			<p dir="LTR">7.34</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.08.05</p>
			</td>
			<td>
			<p dir="LTR">09.12.01</p>
			</td>
			<td>
			<p dir="LTR">7.34</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.08.05</td>
			<td>09.12.01</td>
			<td>7.34</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.08.05</td>
			<td>09.12.01</td>
			<td>7.34</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>

<p>Non-disruptive firmware upgrades: non-disruptive firmware updates is enabled and will not require a server reboot to apply.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following behavior:</p>

<p>Temperature Misreading: the adapter was reading incorrect reading of the temperature on the HPE SN1610Q 32Gb Fibre Channel Host Bus adapter&#39;s Small Form-factor Pluggable. The symptom would result in a temperature spike and potentially reset the system</p>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eaf211f134ef40ba8eea9bd4163e6e57" version="a1eb36c7af6f4c66ba6ded49e3037ed9" lucid_version="igb.rhel9@5.14.16-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.14.16-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.14.16-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e8a7c3696813408f916249b859b6b722" version="99430646838d46de8461b99d75dee7dd" lucid_version="MM1000GFJTE_x64@HPG6(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="79ba405b8c19425aa9a14902b672b652" version="642243c8c63f401480425fe4508739b8" lucid_version="nicfwupg_intel.vmware_Gen9_Gen10@3.22.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="3.22.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with the latest drivers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.21.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports VMware vSphere 8.0.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where the firmware installation exceeds the expected time by using Oneview to update Firmware with 568FLR-MMSFP+.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3d51e7d6b8674f16bd8f67bee278e11a" version="a533f20a651a407ebe22da1b74bbc212" lucid_version="HPE_SR_Gen10_SR308i_Gen11@6.52__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="6.52" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>SR 2.8.2/SR 3.3.2 Drop2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.22" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b9b10cbec6a7489cae77c802c13728a1" version="b6605d0e07874b5e9c9fa0ed3c9fe3c6" lucid_version="MB002000JYDNE_MB004000JYDPB_x64@HPD2(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7ead0459ae26493fa240dac6ad17d606" version="c3dcb463466d4906a161e026b2295693" lucid_version="MLNX_Open_Ethernet_NIC_MFT_FW_package.esxi80@1.0.3__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)</li>
	<li>P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>Firmware for the following device&nbsp;has been updated to 16.35.3006:</strong></p>

<ul>
	<li>P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.<br />
	&nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.<br />
	&nbsp;</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)</li>
	<li>P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>Firmware for the following device&nbsp;has been updated to 16.35.1012:</strong></p>

<ul>
	<li>P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.<br />
	&nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.1012:</strong></p>

<ul>
	<li>Added support for copy modify header steering action to/from the UDP field.</li>
	<li>Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.</li>
	<li>QoS priority trust default state can now be changed using the new nvconfig below:
	<ul>
		<li>QOS_TRUST_STATE_P1</li>
		<li>QOS_TRUST_STATE_P2</li>
	</ul>
	</li>
</ul>

<p style="margin-left:40px">The values that can be used to set the default state are:</p>

<ul style="margin-left:40px">
	<li>TRUST_PORT</li>
	<li>TRUST_PCP</li>
	<li>TRUST_DSCP</li>
	<li>TRUST_DSCP_PCP</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.<br />
	&nbsp;</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.1012:</strong></p>

<ul>
	<li>RDE (Redfish) PATCH operation to LLDPTransmit properties &quot;ManagementAddressIPv4&quot;, &quot;ManagementAddressIPv6&quot; and &quot;ManagementAddressMAC&quot; were applied only in the first attempt, but failed in the next.</li>
	<li>PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.</li>
	<li>Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions.&nbsp;</li>
	<li>InfiniBand L2 QP could not receive RDMA traffic occasionally.</li>
	<li>Running with a debug firmware reduced security as if token was applied.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cf9ee3d9e8f04b18823882812129b4e0" version="7cd48df7caef4b27bd420c6a90e5c92d" lucid_version="MB8000JFECQ_x64@HPD7(K)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="91adee7c0766499184ce8d25a925669e" version="40c0e7a8438342b484e5d401d21392eb" lucid_version="IEGen10.fwpkg@0.2.3.0(B)__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="0.2.3.0" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 0.2.3.0(B) contains updates to the firmware packaging and is functionally equivalent to ver. 0.2.3.0. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 0.2.3.0.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours. On some systems this could result in a brief drop in CPU utilization or network traffic lasting less than a second.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0.2.3.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where Innovation Engine (IE) may improperly reset every 24 hours. On some systems this could result in a brief drop in CPU utilization or network traffic lasting less than a second.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cd1eb2802ed24b6aa04d98effb166b0e" version="9f5b6df4bedb4cc1802d221e22440daf" lucid_version="EO000400PXDBQ_EO000800PXDCK_EO001600PXDCH_ESXi@HPD3(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c1bd991a7a664214ab29388b7b63a963" version="ea7f9dac0db045c698795a2bb745b67e" lucid_version="Apollo_2000_Gen10.Esxi@1.00(F)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.00" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update build environment with SHA384</li>
	<li>Update OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.00 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added VMware ESXi 7.0 support</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4f319faf890642fc80a3d8719760c121" version="b9200e9c0f8548f482e92980571317b4" lucid_version="P408i-p_P408e-p_P408i-a_P408i-c_E208i-p.ESXi@6.52__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="6.52" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>SR 2.8.2/SR 3.3.2 Drop1<br />
&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.22" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="31e3c0de86a045739aadd70ea35e114f" version="e142224a6d9e4b4e8eca1b92e1cb3826" lucid_version="U60.fwpkg@2.00_02-01-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p>Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI ASPM to Disabled/L1 Enabled.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Added "DMI Power Management (ASPM)" option in RBSU. The option has the default value of "disable", which will override default setting of "enable" from the previous ROM. This is due to enabling DMI power management might result in system hang with machine check exception based on Intel erratum RKL-15.</p><p>The path to the option is: Processor Options -> DMI Power Management (ASPM)</p><p></p><p>This setting has the Redfish property URI of: /redfish/v1/systems/1/bios/settings/E3DmiAspm</p><p></p><p>To follow DMTF schema, change the Redfish registry version naming to have the pattern of "^\d+.\d+.\d+$".</p><p>For example, /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will now becomes /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.4 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2023-23583. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.1.1v update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="db808d6aa2e24648bcc5e3f46d635b1a" version="d7ae372703724c5193e70ecb56b26175" lucid_version="hponcfg.linux.x86_64@6.0.0-0(A)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="6.0.0-0" revision="A" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added SHA256 digest to rpm</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Added SHA256 digest to rpm</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.0.0-0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Introduced support for iLO6.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="acb1ff6d668a45ae89fbb3be24e50b7f" version="e2f5e02b5ee24c7ba66bdc0665e294a1" lucid_version="MR000240GWFLU_MR000480GWFLV_VR000480GWFMD_MR00_x64@HPGG(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGG" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGG (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="83fed5e4a427414fb0792283dd57ec37" version="08d7ec68ed6c4293950828446153953e" lucid_version="lpfc.sles15.x86_64@14.2.589.21(b)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="14.2.589.21" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>

<p>The Driver is FIPs Enabled</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p _msthash="125" _msttexthash="882999">The Driver Component is FIPs Enabled</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="14.2.589.21" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d2e7aa5024a34aef908b398a3c4e0625" version="a268e6606b54475ab3b5bf586329435a" lucid_version="SmartDQ.win@106.12.6.0(D)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="106.12.6.0" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update build environment with SHA384</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="106.12.6.0 (B)" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 0/1/5/10 Fault Tolerant Modes.&nbsp;</p>

<p style="margin-left:48px">This issue does not impact systems that have not enabled Smart Array s100i support.</p>

<ul>
	<li>For additional information, reference&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097789en_us">Customer Bulletin a00097789en_us. </a></li>
</ul>

<p style="margin-left:48px"><strong>IMPORTANT INFORMATION:</strong></p>

<ul>
	<li>An array configured with a single RAID 0 logical drive is NOT affected.</li>
	<li>An array configured with a single RAID 1 logical drive is NOT affected.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ad60a281882240318ac9ec3091a5f1c9" version="a5be64a42d7445618cd6bc163a252b02" lucid_version="qlogic_storport_x64.w2k19_rt@9.4.9.21__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="9.4.9.21" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version 9.4.9.21</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.4.8.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version 9.4.8.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a1d749637b0b455e9a43d66fc6eed023" version="9d2d085974e94b9c90337ebef98b2824" lucid_version="MZPLJ1T6HBJR-000H3_MZPLJ3T2HBJR-000H3_MZPLJ6T_ESXi@EPK76H3Q(E)__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="EPK76H3Q" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="EPK76H3Q (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2fa1597649f243c092f040a8ecf90232" version="1ec87aebd1254887ad3e6ea49cef6545" lucid_version="MK000800KWWFE_MK001600KWWFF_MK003200KWWFH_ESXi@HPK3(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bba1d0334a5f4b5fbc1a282af5290868" version="b83f07872a65422ba1104ee97f7df570" lucid_version="MB006000JYDNF_MB008000JYDPC_x64@HPD2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="386eb9df6414454ca63bfe17b21ac760" version="ce8a6cb624e54ac2b75bafdce066a351" lucid_version="MB008000JWWQP_MB006000JWWQN_ESXi@HPD8-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d0d15d83c7a84846a84195d46ef502f4" version="fd092f33918b461f803bfa30481b5049" lucid_version="MLNX_VPI_Ethernet_Infiniband_HCA_FW_package.x64@1.0.12(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.12" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New Features and changes included in version 1.0.12(B):</strong></p>

<ul>
	<li>Version 1.0.12(B) has been recompiled to create the firmware RPM compatible with RPM LIB v4.14.2. As a result, this rebuild firmware version 1.0.12(B) can now be installed successfully on a node with FIPS enabled.</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following changes have been made&nbsp;in sub-version 1.0.12(A):</strong></p>

<ul>
	<li>Product rebuilt to have the new SHA 384 signature.</li>
</ul>

<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.12 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following changes have been made&nbsp;in sub-version 1.0.12(A):</strong></p>

<ul>
	<li>Product rebuilt to have the new SHA 384 signature.</li>
</ul>

<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c65e02b4990e43eea4fa2402b45960eb" version="ce1b9b982230479a829b500843bcb8fd" lucid_version="MB008000GWWQU_MB006000GWWQT_x64@HPG8__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize thermal&nbsp;maximum continuous operation temperature values</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG7 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed&nbsp;an intermittent issue where the incorrect model number can be reported during spin-up</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="29d3ee50608a4989be087dbfc8603ca4" version="795fa6a2b26b4e099dc3d1d49f6858e6" lucid_version="MB6000JVYZD_MB4000JVYZC_x64@HPD4(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fac6c21a4a1e47499a956ff93dccfbd6" version="44c618accb3b4f06be50ec7996436114" lucid_version="qlbb.rhel8@8.74.0.1-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="8.74.0.1-1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supported for Red Hat Enterprise Linux 8 update 9.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fixes an issue where kernel panic with call trace in qedf_ctx_soft.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.72.5.0-1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixes an issue where the system hangs on getting vport stats.</li>
	<li>This product fixes an issue where the mfw version shows 0.0.0.0 on VM with out-of-box drivers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="19810cc433a442df903276a4b0c34598" version="1d5c3bc40c614fc5a0716a56fdc50350" lucid_version="mellanox_winof2.w2k19@23.10.26252.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="23.10.26252.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="23.4.26054.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the ports&#39; number information in the Device Manager. Now the Information Pane of Properties of NIC adapter displays information of more than 2 ports.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="799a5476ba934d049a4150e04e75c398" version="3019728affac4db5bcf801d4947bc81b" lucid_version="FWPKG_MB002000GYDNK_MB004000GYDPD@HPG1__fwpkg-drive_en"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Optimize thermal maximum continuous operation temperature values.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="02a1f5d0f0e244c0b4c2ace636d0f60b" version="4ce8e32b61db4227af0a3040788ff9b2" lucid_version="MB004000GWKGV_x64@HPG1(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="68a7de4833704c8fb3dbc75f2b162b30" version="ecf19b8453d14f3ca9a798c93c4b30c4" lucid_version="EH0600JDYTN_x64@HPD7(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0d1bdabb9bd2412a9e8131f41d12a1c0" version="a846aeb64fb64262a709dcdcb30b8ec9" lucid_version="VK000240GWCFD_VK000480GWCFE_VK000960GWCFF_ESXi@HPG3(I)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d2a88686878e43e6b0ba883edf80c3c8" version="43c26683318e49b8a8e7cb59d9cc0aa7" lucid_version="VK0400JEABD_VK0800JEABE_VO1600JEABF_x64@HPD4(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="348f4fc22c0c4f64b2e050cebccb4347" version="55cb7e5f948442a19671b4a263586091" lucid_version="MicroServerv2GEN10Plus_ME.win.x64@06.00.03.604__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="06.00.03.604" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/01/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2024.1 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="06.00.03.505" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Important Notes:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Firmware Dependencies:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">None</p>

<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Enhancements/New Features:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">This version is in compliance with IPU.2023.3 guidance.</p>

<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Known Issues:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8484f11834644aea8a2a14d1d0d58403" version="d8d7687d99f34d53931b5e269afff543" lucid_version="marvell_e4.win64@8.72.11.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="8.72.11.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.72.1.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of combo image version v8.65.09.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7a0e2103ab3d449ea173c873ce94c871" version="7b6d23a3d90441ee9a05b6707f73d3d2" lucid_version="ssaducli.linux.x64@6.30.8.0__pubsw-linux_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="6.30.8.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>for 2024 March MSB</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.25.9.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f68792033b364ab4b274dc849cf93dea" version="431126ba7d6b4eb6a5637fb5dd79e6d5" lucid_version="nicfwupg_qlflq.vmware@4.18.50__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="4.18.50" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.18.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with drivers</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b64e2e4187274c5798b3aa127c50ba6a" version="64f6fc98959c4ab8b55fb9d6e7a394c2" lucid_version="u43.fwpkg@3.00_02-01-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.

This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 05.01.04.913.<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.</p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p>Addressed an issue where system might hang while accessing IML log from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6adb26c5fc564f219877ab6a448e709b" version="378d4cb36d3541809323062ab2d8e76b" lucid_version="nicfwpkg_intel_e810_xxv4ocp@4.30__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="4.30" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp; ResetToDefault property(RDE Port Schema).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where InterfaceEnabled property is read only and it can&#39;t patch this property</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8d0bd1ce26004a9e8191551757cba42d" version="54823688f4e24faa8dbf23724cdb2206" lucid_version="MO000800JXBEV_MO001600JXBFP_MO003200JXBFQ_x64@HPD1(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="65eb20c47c2e478992fc3cbe0ecae5a8" version="3dc5eeffff9040ba83cffb04253ad235" lucid_version="MLNX_VPI_CX6_HCA_MFT_FW_package.esxi70@1.0.7__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 20.40.1000:</strong></p>

<ul>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21</li>
</ul>

<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>No New features or changes have been included in version 20.40.1000.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.40.1000:</strong></p>

<ul>
	<li>RDE LLDPTransmit ChassisID was occassionally not represented correctly.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 20.37.1700:</strong></p>

<ul>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21</li>
</ul>

<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 20.37.1700:</strong></p>

<ul>
	<li>A new capability enables the VM to track and limit its Vport&#39;s activity. This is done using the new q_counters counter which enables aggregation of other Vport&#39;s from PF GVMI.</li>
	<li>Updated the link maintenance flow to avoid high uncorrectable error rate.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No new fixes have been included in version 20.37.1700</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ce8ca413963e4458ade3268c0f9831f6" version="055293a02d89415e8ddb2dad0d15a102" lucid_version="qla2xxx.driver.esxi80.zip_rt@2023.10.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 5.4.82.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 5.4.81.2-1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7a38c76de8ff4383970907d2998b1740" version="85861614866f4ea7acea31708fab4352" lucid_version="ixn.w2k19@4.1.251.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.251.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1.249.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product updated the copyright information and compatibility with firmware</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8085229a62d8443d85751340431d38d5" version="f3ee31369cc0476ebadac110669e8767" lucid_version="emulex_storport_x64.w2k22_rt@14.2.537.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="14.2.537.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;14.2.537.0</p>

<p>The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="14.0.534.0 (c)" revision="c" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;14.0.534.0</p>

<p>The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b94490ecb4854ca6989ed2491e061c4b" version="77c5893828704286b170bfa7e821ab9c" lucid_version="Apollo_2000_Gen10Plus.Lin@1.27(C)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.27" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support FIPS mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.27 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update build environment with SHA384</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="70cd98996b234f1990b49a33858ae471" version="0ac44e1af6e7462395299ef553840502" lucid_version="MB010000GWAYN_MB008000GWAYL_x64@HPG5(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (F)" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6cc89934ad1740b582b096e05315f04a" version="2a93cf0317f24093825b819e82d37664" lucid_version="MB014000JWUDB_x64@HPD3(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>High Security Enablement support FIPs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a1969a6dced74b848f7c8392464ddc8c" version="31e26e2d6fe742d6ad5f4cd0ab2b37b1" lucid_version="lpfc.rhel8.x86_64@14.2.589.21(b)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="14.2.589.21" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>

<p>The Driver is FIPs Enabled</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p _msthash="125" _msttexthash="882999">The Driver Component is FIPs Enabled</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="14.2.589.21" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8bfd6c84c6a049339ae439f038925df1" version="0da824c5895e485788a41780c5ab1d6e" lucid_version="U60.Win.x64@2.00_02-01-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p>Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI ASPM to Disabled/L1 Enabled.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Added "DMI Power Management (ASPM)" option in RBSU. The option has the default value of "disable", which will override default setting of "enable" from the previous ROM. This is due to enabling DMI power management might result in system hang with machine check exception based on Intel erratum RKL-15.</p><p>The path to the option is: Processor Options -> DMI Power Management (ASPM)</p><p></p><p>This setting has the Redfish property URI of: /redfish/v1/systems/1/bios/settings/E3DmiAspm</p><p></p><p>To follow DMTF schema, change the Redfish registry version naming to have the pattern of "^\d+.\d+.\d+$".</p><p>For example, /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will now becomes /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.4 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2023-23583. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.1.1v update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4ac05ec48f5041978979616c09c3b9fb" version="aa51f65e4dcc491c93444df54d0a3f9f" lucid_version="EG000600JWEBH_EG000300JWEBF_x64@HPD5(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8bd617958fd64494b0066602dc57ff65" version="7b6921cb096b4ab9974a6d638e461eb8" lucid_version="DL20ML30Gen10SPS.Win.x64@05.01.04.913__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.913" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with Intel IPU.2023.3 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.804" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.1 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cb3ccbb54e5e4346a7916c413650fffc" version="093928dcbf3b48cbb100ac6b882deb82" lucid_version="VO000960KWVBR_VO001920KWVBT_VO003840KWVBU_x64@HPK2(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK2" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for BIOS RSOD issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="57c8ff295b854dbeaea4e204fed3ef83" version="d9860ae2392e417fae9fbf8aeb65d311" lucid_version="EG000300JWBHR_x64@HPD5(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ab0976902eae4e0c8757219b825c91f8" version="09a0d96db04a4f4bbb5410de77bb7d09" lucid_version="u30.fwpkg@3.10_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bf6c1988a6474823969dd84808070288" version="2dc9e678e41c40ada447bafe16bef117" lucid_version="U40.win.x64@3.10_02-22-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d9b51eadf7e440fc88f26963aec59690" version="daefb77b3eb04d4887fee9a0d6552745" lucid_version="MicroServerGEN10PlusSPS.Win.x64@05.01.04.913__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.913" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with Intel IPU.2023.3 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.804" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.1 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d3e8a053234f49d9a3735931f34c77c7" version="3581b8f73390466c95e3f84c1bfc4f47" lucid_version="U43.Linux@3.00_02-01-2024__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.

This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 05.01.04.913.<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.</p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p>Addressed an issue where system might hang while accessing IML log from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="30f1903e29c9444e8763652af6b41477" version="444fcf41027540609faed6527fda8728" lucid_version="ixgbevf.rhel8@4.18.7-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.18.7-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 8.8.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.18.7-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 8.8.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5aad4922b5f54198b1d9a8e400dcfdda" version="3bcfd2377940409fa1875bdf004266cf" lucid_version="Gen10P_Gen11_MR_Controller.sles15.x86_64.rpm@07.726.03.00-rev1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="07.726.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>New release for version 07.726.03.00.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="07.726.03.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>New release for version 07.726.03.00.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4dae182fcdec4e4aa31d1ea079120a60" version="ab632fb5ac994e99afb703ad66a1bb2f" lucid_version="EG001800JWFVC_x64@HPD4(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cc96bd351eff4426bf37f3da741a7623" version="666e31dabb4549b3a30142036ba64e27" lucid_version="MB004000GWKGV_ESXi@HPG1(H)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b208c604a379445cb8f4da716ed6946e" version="230d135dc67940d4833d68422b495039" lucid_version="MLNX_VPI_Ethernet_Infiniband_HCA_FW_package.esxi70@1.0.1(A)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.1" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following changes have been made&nbsp;in sub-version 1.0.1(A):</strong></p>

<ul>
	<li>Product rebuilt to have the new SHA 384 signature.</li>
</ul>

<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="30c69f83193c4f679a84938a219df0d6" version="ebab50a63d7b429b9d159db0ec6f41e2" lucid_version="iavf.w2k22@1.14.201.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.14.201.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.13.8.0 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which the component can&#39;t read the current driver version.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0b5ea35199d249309413cdf1ab404c23" version="b2a4c3a4e4fe4c0c88217db0fe1487f2" lucid_version="nicfwupg_intel_open.win64@5.3.6.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.3.6.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.3.5.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with new&nbsp;drivers</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b8b6b31789ce4119a48876ba4b89c81f" version="4071e2abdb5e48c8bf6d56e10fbb7654" lucid_version="U48.fwpkg@3.00_02-01-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.

This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 05.01.04.913.<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.</p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where Restore Manufacturing Defaults and Restore Defaults from iLO web did not restore the Secure Boot Status.</p><p></p><p>Addressed an issue where system might hang while accessing IML log from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e760dc1509734b53830053c8a8b00097" version="6ea0648b63974086a7f75012870687fb" lucid_version="lpfc.rhel9.x86_64_legacy@14.2.589.21(b)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="14.2.589.21" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>

<p>The Driver is FIPs Enabled</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p _msthash="125" _msttexthash="882999">The Driver Component is FIPs Enabled</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="14.2.589.21" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="15c5494e659e4865b78e60077bae7860" version="e35ed67ba0964477af7788bea5c29783" lucid_version="VS000480KXALB_VS001920KWXFP_VS000960KWXFN_x64@85032G00(D)__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="85032G00" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="85032G00 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Implements FW-based VPD.</li>
	<li>ARP setting is changed from &ldquo;Capable &amp; Discoverable&rdquo; to &ldquo;Fixed &amp; Discoverable&rdquo;.</li>
	<li>A minor tweak to the Foreground Media Scan (FMS) algorithm to ensure critical variables are initialized properly.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="094c75ee866a4b1bb6f0e035ac316695" version="191ccaa1fdba4b16822089ae2adf251c" lucid_version="neches.chif.win2022.x64@4.7.1.0(E)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="4.7.1.0" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1.0 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added supported_platforms tag</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cca7377cd12644cab41f5bd7e94cc2bd" version="f49355983bd3476fb3346dc38f7ac1c2" lucid_version="FWPKG-P23665-B21@20.40.1000__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.40.1000" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>No New features or changes have been included in version 20.40.1000.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.40.1000:</strong></p>

<ul>
	<li>RDE LLDPTransmit ChassisID was occassionally not represented correctly.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="20.39.1002" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p><strong>New features and changes included in version 20.39.1002:</strong></p>

<ul>
	<li>Get Temperature OEM command now always returns a unified temperature.</li>
	<li>Enabled Management Component Transport Protocol (MCTP) over PCIe.</li>
	<li>Added a caching mechanism to improved expansion ROM performance and to avoid any slow boot occurrences when loading the expansion ROM driver.</li>
	<li>Added new support for reserved mkey index range. When enabled, a range of mkey indexes is reserved for mkey by name use.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No new fixes have been included in version 20.39.1002.</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2433baff8f4443ed8ddae6e9a115bc4d" version="32389e639dce47338c551118efa38877" lucid_version="intel_pvl.w2k22@13.0.16.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="13.0.16.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="13.0.13.0 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which the component can&#39;t read the current driver version.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a49dd08da845410cb98aa24a3deb45b2" version="8daeeea8dd654f5eb0732f8cf967aba9" lucid_version="Gen10Plus_UBM3_Backplane_PIC@1.24(B)-rev1__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.24" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Rebuild with SHA384 format</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.24 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Rebuild with SHA384 format</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="da6c398c130f48f9a5a32bd3c9213a90" version="9e4c5785614a4b9cbaccabded8d0faa8" lucid_version="MLNX_VPI_CX4_CX5_HCA_FW_package.x64@1.0.15(A)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.15" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)</li>
	<li>825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been&nbsp;updated to 16.35.3006:</strong></p>

<ul>
	<li>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)</li>
	<li>872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)</li>
</ul>

<p>Important : Security Hardening Enhancements - This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device firmware to this version to improve the firmware security and reliability of your device.</p>

<p><strong>New Features and changes included in version 1.0.15(A):</strong></p>

<ul>
	<li>Version 1.0.15(A) has been recompiled to create the firmware RPM compatible with RPM LIB v4.14.2. As a result, this rebuild firmware version 1.0.15(A) can now be installed successfully on a node with FIPS enabled.</li>
</ul>

<p><strong>New Features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version&nbsp;12.28.2006:</strong></p>

<ul>
	<li>Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.15" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)</li>
	<li>825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been&nbsp;updated to 16.35.3006:</strong></p>

<ul>
	<li>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)</li>
	<li>872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)</li>
</ul>

<p>Important : Security Hardening Enhancements - This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device firmware to this version to improve the firmware security and reliability of your device.</p>

<p><strong>New Features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version&nbsp;12.28.2006:</strong></p>

<ul>
	<li>Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8e3928e62813480eab785be8f1d93fd8" version="2cf4e936c08d43e98eb512c554572805" lucid_version="MB2000JFDSL_MB4000JFDSN_ESXi@HPD4(K)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (K)" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="55aaafbf4e5149bd9a06cddaff69d915" version="24a5ad3519684b01872058fddd9570b6" lucid_version="HPE-CNA-FC-Emulex-Enablement.rhel8.x86_64@14.2.589.11(b)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="14.2.589.11" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to&nbsp;version 14.2.589.11-1</p>

<p>The Enablement Kit&nbsp;is FIPs Enabled</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The Driver is FIPs enabled&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="14.2.589.11" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to&nbsp;version 14.2.589.11-1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e528a2af212b4bb09bfd3cb54b985653" version="b662eec7b809411592194ebf17429a4b" lucid_version="Apollo_4200_Gen10_Plus.Lin@0.39(E)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="0.39" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support FIPS mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0.39 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add RHEL9 OS support</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fix issue for component unable to be displayed on offline SPP</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="81163fed551c4f30a0af9ef8c5746c3e" version="fb6797bc2c7b40218428e400a2e66fad" lucid_version="MT001600KWHAC_MT003200KWHAD_MT006400KWHAE_x64@HPK2(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="596340d3247946aaa109faeb065a7eab" version="6792a0189dbd4546af4f8cda40a0b204" lucid_version="MB008000JWRTD_x64@HPD2(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="29456540dcc74eaf9f223e63cf50eff7" version="f656d44d80c54004bb28f3b706982a68" lucid_version="MK000240GWKVK_MK000480GWJPN_MK000960GWJPP_MK00_x64@HPG5(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a2580f8b900b4c35b050bbb3d0fe3010" version="71c13bc55b1943749056a240567b057f" lucid_version="MO001600KWVNB_MO003200KWVNC_MO006400KWVND_ESXi@HPK3(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d9159bc289514e83950fce1ae62143a1" version="8bdbe2691b664b62b53de60490a4535c" lucid_version="MB6000JVYZD_MB4000JVYZC_ESXi@HPD4(I)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0367c5af98fb417f82fedfd076b3ea41" version="be2714a30595486cb13765e6a3eddbb8" lucid_version="Gen10Plus_UBM6_Backplane_PIC@1.04__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.04" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>2023 Sep MSB Usage</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="93312d51d8f7459ba48a2a8cbf6722a2" version="4b2e50e8d2064f0d81ae2a771e347a3c" lucid_version="ssacli.vmware8.0.sc@2024.04.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.04.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>for 2024 March MSB</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.10.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aa6bec5edbc1481bba28cd93023707d3" version="855ee4fa31e249f090922d39f10b3d3c" lucid_version="MB6000GEBTP_x64@HPG4(M)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="M" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (L)" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="469940c0952a4663869967a1b63d9175" version="3e0616d0a5d542178dd373399926a717" lucid_version="Gen10P_Gen11_Storcli-sut.esxi70@2023.12.01-rev1__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.12.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Support autoconfig command.</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<strong><em>storcli /cx set autoconfig = &lt; none | JBOD &gt;</em></strong></p>

<ul>
	<li>Added a new option [ReuseTargetId] to add vd command. If &quot;ReuseTargetId&quot; is mentioned in the add vd command, the FW will allow reusing of TargetIDs without 120 seconds delay.</li>
	<li>Added support for UBM7 backplanes.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.12.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>New release for version 007.2613.0000.0000.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="96853662d13b4def814a5c153a747271" version="e17f8d69c0ee46479e695ce07ab8d58a" lucid_version="MB004000JWKGU_x64@HPD2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="C8691" version="6a80812503c54ef5861344ae81162f5d" lucid_version="fibreutils_x86_64.linux.RHEL@4.2-1(i)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.2-1" revision="i" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This package supports only&nbsp;Red&nbsp;Hat Enterprise&nbsp;Linux&nbsp;(RHEL) Distros</p>

<p>This Component is FIPs enabled.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This Component is FIPs enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.2-1 (h)" revision="h" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This package supports only&nbsp;Red&nbsp;Hat Enterprise&nbsp;Linux&nbsp;(RHEL) Distros</p>

<p>Modified adapter support -- added 16Gb adapter support ( 1200E,1100Q single and dual adapter support )</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f5b93810cc2347bb802707c26e414376" version="01cca797d6d741808fadd2df8c476df2" lucid_version="FWPKG-P10180-B21@22.39.1002__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="22.39.1002" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p><strong>New features and changes included in version 22.39.1002:</strong></p>

<ul>
	<li>Modified the TCP IPv4 flows so that the steering TIR rx_hash_symmetric field is now valid only when both the SRC and DST fields are not set to zero.</li>
	<li>Added a locking mechanism to protect the firmware from a race condition between insertion and deletion of the same rule in parallel. Such behavior occasionally resulted in firmware accessing a memory that has already been released, thus causing IOMMU / translation error.</li>
</ul>

<p style="margin-left:40px">Note: This change will not impact insertion rate for tables owned by SW steering.</p>

<ul>
	<li>Enabled live migration for virtio with mergeable buffer.</li>
	<li>Added a caching mechanism to improved expansion ROM performance and to avoid any slow boot occurrences when loading the expansion ROM driver.</li>
	<li>Added support for image size above 4GB when performing a live migration by splitting the image to chunks.</li>
	<li>Extended the role-based authentication to cover all crypto algorithms. Now the TLS. IPsec. MACsec. GCM, mem2mem, and NISP work when nv_crypto_conf.crypto_policy = CRYPTO_POLICY_FIPS_LEVEL_2, meaning all cryptographic engines can also work in wrapped mode and not only in plaintext mode.</li>
	<li>Programmable Congestion Control is now the default CC mechanism. ZTR_RTTCC is the default CC algorithm when ECE is enabled and the CC algorithm negotiation succeeds, otherwise PCC DCQCN will be used.</li>
	<li>Added new support for reserved mkey index range. When enabled, a range of mkey indexes is reserved for mkey by name use.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 22.39.1002:</strong></p>

<ul>
	<li>Migration data corruption occurred when running parallel save_vhca_state/load_vhca_state commands on the same PF.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="22.37.1700" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New features and changes included in version 22.37.1700:</strong></p>

<ul>
	<li>Added a safety mechanism to prevent the link from to getting stuck when receiving bad tuning results. In this case, the linkup flow is restarted and the mechanism retries to raise the link.</li>
	<li>Improved rate limit token re-distribution algorithm.</li>
	<li>Improved non-consumed bandwidth re-distribution.</li>
	<li>Added mergeable buffer support (VIRTIO_NET_F_MRG_RXBUF in virtio spec) for VDPA kernel mode to improve performance in case of large MTU such as 9K. The feature is disabled by default and must be manually enabled while creating or modifying the virtio device.</li>
</ul>

<p style="margin-left:40px">&nbsp;&nbsp; &nbsp;Note: For best performance, it is NOT recommended to enable the feature if the VDPA MTU is set to the default value (1500).</p>

<ul>
	<li>A new capability that enables the VM to track and limit its Vport&#39;s activity. This is done using the new q_counters counter which enables aggregation of other Vport&#39;s from PF GVMI.</li>
	<li>Added a flow rule that enables offloading of multicast traffic by broadcasting it to multi-Flow-Table in FDB.</li>
	<li>Enables a smooth and statically switch between PCC algorithms. In addition, the user can now switch between PCC algorithms while running traffic.</li>
	<li>Added support for running PCC firmware trace without saving and sending the DB strings to the tool with the following changes:
	<ul>
		<li>Added new string section to the user PCC image creation tool</li>
		<li>Added the new PCC DB strings to MTRC access registers output</li>
		<li>On the tool&#39;s part: added support to reading the string.db using the MTRC access registers</li>
	</ul>
	</li>
	<li>Added support for 32 actions in the header modify pattern using bulk allocation.</li>
	<li>The software can explicitly set the SL of an RTT response packet, instead of it being taken from the RTT request packet&#39;s SL. The RTT response packet SL may be set/queried via the CONGESTION_CONTROL_HCA_NP_PARAMETER MAD.<br />
	&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 22.37.1700:</strong></p>

<ul>
	<li>No ping in NODNIC VF when VLAN stripping was enabled.</li>
	<li>vDPA application initialization failed due to virtual queue creation failure. The failure came with the &quot;0x8f7a: ring address translate failed&quot; assert which indicates incorrect permission supplied by QEMU for virtual ring memory.</li>
	<li>CNP received, handled, and ignored counters in the hardware counters could not work after moving to Programmable Congestion Control mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="63976963938d4f79be04f7b652abb966" version="9c2d4da12d0c425782cbefbff82aa00e" lucid_version="MB014000JWRTH_MB012000JWRTF_MB010000JWRTE_x64@HPD2(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="21d70f91419f44f0a429331de70ce506" version="0d57343371444c6b867027e2aa7804fb" lucid_version="ET000750KWJTF_EO000750KWTXC_EO000375KWJUC_x64@4ICSHPK4(H)__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4ICSHPK4" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4ICSHPK4 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA <a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3126d8d47de5417a878b30ed83f0673f" version="85fd750793d1464689f1e1c5183d236e" lucid_version="Gen10P_Gen11_MR_Controller.win2022@7.726.1.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="7.726.1.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>7.26 Aug PA1 Drop</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.724.2.0 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support HPE ML30 and DL20 Gen11 server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ffbc55840f92498790e9569c6abb14d8" version="15696223bde1401a8d578e5a645d21ee" lucid_version="KCM6XVUL800G_KCM6XVUL1T60_KCM6XVUL3T20_x64@GPK7__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="GPK7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for BSOD issue due to SRIS misdetection and FW Commit command via PCIe VDM (MCTP OVER PCIe) timed out.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="GPK6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7e6f42aebfdb4390968da43b36518880" version="ea7b60f1dffe4c3d8def5d93511dc8b9" lucid_version="EH000900JWHPK_EH000600JWHPH_x64@HPD8(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine &ldquo;sweeping&rdquo; of the media surface.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine &ldquo;sweeping&rdquo; of the media surface.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="95e1a7b8a2664cd8b8d67128eff9bb87" version="a6b8df86acec417b902821bab4453fec" lucid_version="neches.asr.win2016.x64@4.7.1.0(E)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="4.7.1.0" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1.0 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added supported_platforms tag</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cd60e68416444c61a56b3c63cb2d1ca3" version="991138cb2f15402cb37a834472fb5578" lucid_version="D3000.fwsc.esxi@5.04(H)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="5.04" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support of ESXi 8.0 U1<br />
&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v234600/20-D3000-Gen10RN504G_ED7.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.04 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v202692/20-D3000-Gen10RN504C_ED3.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="df6ba3c2e569412ab3999b9575ddb1d8" version="bc79a1fb6d9346f28f1208549537647b" lucid_version="MB004000GWWQH_MB002000GWWQF_MB001000GWWQE_ESXi@HPG6-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Update maximum continuous operation temperature values for host thermal management and reporting.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Update maximum continuous operation temperature values for host thermal management and reporting.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a88170da558d4ca79c0a5aa7982152c5" version="620142e750cf4abead56e96c963f17ad" lucid_version="MB010000GWZGT_MB012000GWZGU_MB014000GWZGV_ESXi@HPG1(C)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="52d86414c1094be5a91709cfda5fa592" version="37c012d27a45474ba3fbd38d52c8ffbe" lucid_version="Gen10Plus_UBM2_Backplane_PIC@1.20(B)-rev1__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.20" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>
	<p>Rebuild with SHA384 format</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.20 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>
	<p>Rebuild with SHA384 format</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d36b5614c00b4d00b66a58209cc5bffb" version="712daf2ca6e14d2580da8db33280ad65" lucid_version="u41.linux@3.10_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="62c5be0602154ae6afbf730b5a1cb394" version="0d4d4c119c464665936a02caa42f9c16" lucid_version="EG000600JWFUV_EG001200JWFVA_x64@HPD4(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cd4b5a9c9ed9405abbc5be7a9f037870" version="49448c1c86f34ecb883a5eee8ef0fd98" lucid_version="amsd_sles15@3.5.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.5.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The SLES15 AMS rpm is now FIPS compliant</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:&nbsp;</p>

<ul>
	<li>Fixed the issue where AMS was crashing after plugging and removing a USB drive</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.4.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The following enhancements are included in this release:</p>

<ul>
	<li>A warning&nbsp;and terminate&nbsp; amsd message is now displayed when&nbsp;system SW RAID is enabled</li>
	<li>Added &quot;support iLO6&quot; string to the description field of the amsd installation file</li>
	<li>Added ahslog service status to system log</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:&nbsp;</p>

<ul>
	<li>Added an error handling mechanism so that the ahslog service will no longer crash when there is no system package or the packet is NULL.</li>
	<li>Customers who use the snmpwalk command to query cpqSePciSlotWidth OID will see the correct data reported for all ports</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aedaa041caed4345872545de3f1efa40" version="c6aa8266ee46481bb7a63ad2982832af" lucid_version="MM1000JFJTH_x64@HPD5(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="672edcd2af9a4bd18876e5e3192cd831" version="d0aeab7614ee4bf88eb2530cc66b5fde" lucid_version="U40.linux@3.10_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ae8b95207bc948489c851dd62c16f373" version="aefb8a948edc4eee9302c71abddec5f4" lucid_version="EO000400JWDKP_EO000800JWDKQ_EO001600JWDKR_x64@HPD2(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d54c971d2c3047569ed2e37939cd2848" version="a8db49aa8d854e8e887756bec2d69ff6" lucid_version="EO000400JWDKP_EO000800JWDKQ_EO001600JWDKR_ESXi@HPD2(H)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="07f321e61ae446eba28c1b93476d5170" version="5fde631ae6194b65916b52e7751d31d9" lucid_version="EG1800JFHMH_x64@HPD8(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5410a19b6b464f26bd8935266bc1120d" version="bbbae3b4a0824db2867ebf8023534748" lucid_version="u39.fwpkg@3.10_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d31e8e30285a40108d05d6b3dc709695" version="ef785ef3edc24286af79018f02ec54b3" lucid_version="MB010000GWAYN_MB008000GWAYL_ESXi@HPG5(I)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a8ea930bfde1449ab4444eb61f65be31" version="83c83fda963142c8ace1b65c9bcaa6fa" lucid_version="MLNX_Open_Ethernet_NIC_MFT_FW_package.x64@1.0.0.10__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.10" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)</li>
	<li>P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>Firmware for the following device&nbsp;has been updated to 16.35.3006:</strong></p>

<ul>
	<li>P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.<br />
	&nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.<br />
	&nbsp;</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.9" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)</li>
	<li>P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>Firmware for the following device&nbsp;has been updated to 16.35.1012:</strong></p>

<ul>
	<li>P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.<br />
	&nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.1012:</strong></p>

<ul>
	<li>Added support for copy modify header steering action to/from the UDP field.</li>
	<li>Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.</li>
	<li>QoS priority trust default state can now be changed using the new nvconfig below:
	<ul>
		<li>QOS_TRUST_STATE_P1</li>
		<li>QOS_TRUST_STATE_P2</li>
	</ul>
	</li>
</ul>

<p style="margin-left:40px">The values that can be used to set the default state are:</p>

<ul style="margin-left:40px">
	<li>TRUST_PORT</li>
	<li>TRUST_PCP</li>
	<li>TRUST_DSCP</li>
	<li>TRUST_DSCP_PCP</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.<br />
	&nbsp;</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.1012:</strong></p>

<ul>
	<li>RDE (Redfish) PATCH operation to LLDPTransmit properties &quot;ManagementAddressIPv4&quot;, &quot;ManagementAddressIPv6&quot; and &quot;ManagementAddressMAC&quot; were applied only in the first attempt, but failed in the next.</li>
	<li>PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.</li>
	<li>Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions.&nbsp;</li>
	<li>InfiniBand L2 QP could not receive RDMA traffic occasionally.</li>
	<li>Running with a debug firmware reduced security as if token was applied.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1cadb74f384743de9dfa8d9d6bc9f7b5" version="f2b18f2a3f3d40a796ffe6909860e66d" lucid_version="MB006000GWJRR_MB008000GWJRT_ESXi@HPG6-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer -&nbsp;Improve random mix performance in TL=2048k and 512k</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer -&nbsp;Improve random mix performance in TL=2048k and 512k</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="63f9bb70bcb94f2c9378d569ebb38b7e" version="0cbc5c197631428f9035901ae733aa87" lucid_version="MB2000GFEMH_MB4000GFEMK_ESXi@HPG6(K)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (K)" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d2753039facd45788d8eb7892e214eed" version="f98ec495f75f45f3946a7896921d65f1" lucid_version="MB014000JWTFD_MB012000JWTFC_x64@HPD8(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8d2bd99747b540d2a364efef8e58a91c" version="f2552620326b41a8a86bf4c98b3d0175" lucid_version="nicfwpkg_bcme@228.1.111000__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="228.1.111000" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed the sequence to store PLDM Monitoring and Control events before BMC&#39;s SetEventReceiver command.</li>
	<li>This product fixed the problem of port Reset command not forcing 10G module to shut down link properly.</li>
	<li>This product fixed the problem of PFC flood if shutdown the system while running RoCE traffic.</li>
	<li>This product fixed NC-SI Get NC Capabilities and Settings response MaxPFs value.</li>
	<li>This product fixed the restriction of PF/VF bar sizes to valid values.</li>
	<li>This product fixed random Whp-livepatch failure due to out-of-order function.</li>
	<li>This product fixed the failure capture of connection status in IML log due to RDE entry not properly implemented for WH+.</li>
	<li>This product fixed the problem that some RDE address management properties could not be applied simultaneously for WH+.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.1.111000" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed PFC flood problem when shut down system while running RoCE traffic.</li>
	<li>This product addressed PCIeVDM communication problem between BMC and NIC after an error recovery.</li>
	<li>This product addressed the PHY level packet drop.</li>
	<li>This product addressed the problem of multi-cast traffic gets leaked to unintended functions.</li>
	<li>This product addressed the reporting mechanism of NCSI max temperature.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d6816ab14fc34e169d27b5a4d2e7e7a1" version="880e1139014242de88a92eff9c6eccc0" lucid_version="igbn.vmware70@2023.09.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.09.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fix an issue that TCP traffic on VMs might be interrupted if PF undergoes a reset.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.03.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following new server.</p>

<p style="margin-left:40px">HPE ProLiant DL560 Gen11 Server<br />
HPE ProLiant DL110 Gen11 Server<br />
HPE ProLiant ML110 Gen11 Server</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="070f2ccb66ec4478ba85a2e3d9712434" version="d1f355155ad7487dac55f8eb8277ec68" lucid_version="EH000900JWCPN_EH000600JWCPL_EH000300JWCPK_ESXi@HPDA-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize sensor reporting to improve failure rate - AFR (Annual Failure Rate) metrics</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDA" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize sensor reporting to improve failure rate - AFR (Annual Failure Rate) metrics</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1655bc494b334729864d929c38544849" version="81b8d7fb1fdc4d00a3fe676ddbd2fda1" lucid_version="Gen9_EXP.Esxi@5.15(B)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.15" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Add support of new flash on the latest expander board.</li>
	<li>Provided a proper downgrade restriction to ensure firmware compatibility with the latest flashes.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.15" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Add support of new flash on the latest expander board.</li>
	<li>Provided a proper downgrade restriction to ensure firmware compatibility with the latest flashes.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ed7a5d4d2f9c4a55ba7dea78369f1389" version="e11a46a8fa0a41dab3ed3f657e74bd06" lucid_version="bnxtnd.w2k22@228.0.121.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="228.0.121.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.0.125.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed the problem that RoCE driver failed to load with specific active firmware version.</li>
	<li>This product addressed private data retrieval for user mode RDMA connectors.</li>
	<li>This product addressed a fix for NDSPI to correctly detect the type of retransmit capability.</li>
	<li>This product addressed correct NDIS version of file details of the Server2022 build.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6ee949809c8346d9b5134787ab827a8a" version="cad249a57ff1420ebe87496c5dc0570d" lucid_version="MB010000JYDKK_MB012000JYCJF_MB014000JYCJV_x64@HPD3__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Assert fixes, logging enhancements and all current firmware improvements and bug fixes.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the logic bug in the media cache cleaning abort handling that caused the drive to choose and execute the R/W command before the Request Sense to prevent assert.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="630e644160fa42ef980745ef1697fa39" version="8c0ff1f35a014ee08440272bdd5acf1b" lucid_version="MB012000JZYVN_MB014000JZYVP_MB016000JZYVQ_x64@HPD4__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves performance in certain file systems and implements fixes for several of the previous firmware&rsquo;s shortcomings.</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in certain error and timing conditions.</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves data integrity</li>
	<li>Decreases&nbsp;possibility of data corruption in certain error and timing conditions</li>
	<li>Reduces the probability of hangs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3d1400a6e0204fb498134f7e6e3f374a" version="d102447f7f28439a9f187c25be0c4054" lucid_version="MB001000GWJAN_MB002000GWFWA_MB004000GWFWB_x64@HPG1(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d6810024a18142b0a4b8ec4db68a4e55" version="a10e886cdfe74cab92c4a357ded62bc7" lucid_version="D3000.fwsc.linux_x64@5.04(H)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="5.04" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of RHEL 8.7</p>
	</li>
	<li>
	<p>Added support of RHEL 9.1</p>
	</li>
	<li>
	<p>Added support of SLES15 SP4</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v234600/20-D3000-Gen10RN504G_ED7.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.04 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of Rhel 7.8&nbsp;</p>
	</li>
	<li>
	<p>Added support of Rhel 8.2&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP2</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v202692/20-D3000-Gen10RN504C_ED3.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a2c850b33a31462c8693efedafbdd8b9" version="f7c9973471454c528c91a292e6179c4b" lucid_version="nicfwupg_qlflq.linux_x64@1.23.50(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.23.50" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where BSOD is seen.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.23.50" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where BSOD is seen.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dceed791e6be42c1ba1f138aa6af8451" version="e9b1a37851074d85853210f42fb0c0bd" lucid_version="MB1000GDUNU_MB2000GDUNV_MB3000GDUPA_MB4000GDUP_x64@HPG4(K)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aa62b707fef04bb99492053e558daffb" version="c0e218d33cd94d53a47add1f0d7a2077" lucid_version="MB016000JWXKH_x64@HPDA(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDA" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ec5ba4f75ae340e39f8e129f646a9647" version="bd32a0b78b934e34a07a135c2d407d32" lucid_version="MLNX_Open_Ethernet_NIC_MFT_FW_package.x64@1.0.10(A)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.10" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)</li>
	<li>P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>Firmware for the following device&nbsp;has been updated to 16.35.3006:</strong></p>

<ul>
	<li>P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New Features and changes included in version 1.0.10(A):</strong></p>

<ul>
	<li>Version 1.0.10(A) has been recompiled to create the firmware RPM compatible with RPM LIB v4.14.2. As a result, this rebuild firmware version 1.0.10(A) can now be installed successfully on a node with FIPS enabled.</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.<br />
	&nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.<br />
	&nbsp;</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.10" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)</li>
	<li>P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>Firmware for the following device&nbsp;has been updated to 16.35.3006:</strong></p>

<ul>
	<li>P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.<br />
	&nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.<br />
	&nbsp;</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5f7ee6a6e6404443973d0cc0a41a28a3" version="aa1883ebcf8046058b8fde14b574fd47" lucid_version="icen.vmware70@2023.10.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product fix an issue that TCP traffic on VMs might be interrupted if PF undergoes a reset.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fix an issue that TCP traffic on VMs might be interrupted if PF undergoes a reset.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a6a815c1e19641d7b77e2e862e63ca3a" version="dc5dd6c1b26144fca6abf0a9518e385a" lucid_version="FWPKG-P10112-B21@16.35.3006(A)__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="16.35.3006" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Important : Security Hardening Enhancements - This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device firmware to this version to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 16.35.3006(A):</strong></p>

<ul>
	<li>Component rebuilt to set the &#39;ResetRequired&#39;, &#39;SysPowerON&#39; parameter values to &#39;true&#39; in the included payload.json file. This will help SUM categorize the component appropriately for deployment in SPP, and display the correct user prompt after firmware component execution.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="16.35.3006" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Important : Security Hardening Enhancements - This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device firmware to this version to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7a409aa1e5444a57b8b10f884c98ae5f" version="84e046f56739495d95bb6e56d112b464" lucid_version="vxn.w2k19@2.1.249.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.1.249.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product updated the copyright of the new year and compatibility with firmware.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.1.241.0 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with CNSA (Commercial National Security Algorithm) compliance.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a5b53b4bfa36450dafe72d3912e27c73" version="628a00a328304cd1beceb54c0c53c7f8" lucid_version="ice.rhel9@1.12.6-1(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.12.6-1" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports linux command to split port.</li>
	<li>This product now supports MSI-X vector allocation tuning by sysfs.</li>
	<li>This product now supports limiting the Maximum Bitrate for a Transmit Queue.</li>
	<li>This product now supports generic binary RPM starting from Red Hat Enterprise Linux 9.2.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue where the Linux Firmware&nbsp;update results in system hangs.</li>
	<li>This product correct an issue where when using certain DDP package versions, 802.1ad type VLANs might not be correctly enabled on SIOV or SR-IOV interfaces.</li>
	<li>This product correct a ptp4l kernel crash and several ptp related issues.</li>
	<li>This product correct an issue where the ice driver fails to remove the GNSS module properly on driver unload, resulting in a kernel panic.</li>
	<li>This product correct an issue where running traffic via Open vSwitch.</li>
	<li>This product correct an issue where a performance issue caused the GNSS write commands to be delayed and not delivered until the next commands appeared.</li>
	<li>This product correct an issue for Linux ice driver v1.7.16+ on E810 four-port devices where VF could not be created on certain high-core count platform.</li>
	<li>This product correct an issue where unloading a driver without a DDP profile would disable PF interfaces.<br />
	&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.6-1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports linux command to split port.</li>
	<li>This product now supports MSI-X vector allocation tuning by sysfs.</li>
	<li>This product now supports limiting the Maximum Bitrate for a Transmit Queue.</li>
	<li>This product now supports generic binary RPM starting from Red Hat Enterprise Linux 9.2.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue where the Linux Firmware&nbsp;update results in system hangs.</li>
	<li>This product correct an issue where when using certain DDP package versions, 802.1ad type VLANs might not be correctly enabled on SIOV or SR-IOV interfaces.</li>
	<li>This product correct a ptp4l kernel crash and several ptp related issues.</li>
	<li>This product correct an issue where the ice driver fails to remove the GNSS module properly on driver unload, resulting in a kernel panic.</li>
	<li>This product correct an issue where running traffic via Open vSwitch.</li>
	<li>This product correct an issue where a performance issue caused the GNSS write commands to be delayed and not delivered until the next commands appeared.</li>
	<li>This product correct an issue for Linux ice driver v1.7.16+ on E810 four-port devices where VF could not be created on certain high-core count platform.</li>
	<li>This product correct an issue where unloading a driver without a DDP profile would disable PF interfaces.<br />
	&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f8437d6127664644832d2cd688d58903" version="a23c5aa33ef0465c9e96aa479fca53a0" lucid_version="A40.win.x64@3.00_01-26-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with vulnerability fixes in EDK2 NetworkPkg IP stack implementation that is described in the address https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.



This revision of the System ROM includes AMD reference code NaplesPI 1.0.0.K for AMD 1st Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bc3fe657ed304b17aeeab14dfddb1656" version="6823706ca8474a37bf2b34a76ae9ca8b" lucid_version="D3000B.fwsc.win_x64@6.00(B)__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="6.00" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>Code optimization to save memory repo.</p>
	</li>
	<li>
	<p>TLB exception seen while doing esp reset when expander reset was in progress.</p>
	</li>
	<li>
	<p>Added the psoc 8.93 binary in peripheral images, updated the reveille version numbers.</p>
	</li>
	<li>
	<p>Added whole new Delta PS-pmbus code , Updated the ESP version number.</p>
	</li>
</ul>

<p>Please refer to the<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1808229885/v234599/20-D3000B-Gen10RN600A_ED2.html">&nbsp;<u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b9dda486435f4c78a30de5b1c831c135" version="aec8b9cfc5d346de9ec30a043a6d9ad0" lucid_version="Apollo_4200_Gen10_Plus.Win@0.39(C)__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="0.39" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update build environment with SHA384</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0.39 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modify Product ID&nbsp;to &quot;A4200 Gen10P LFF&quot; and &quot;A4200 Gen10P SFF&quot; to distinguish the different generation expander backplane.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a96fcafbb6d4411b8c5383684726a0e9" version="5ec014a48ddf46b9a6b7fec6ac06ec0d" lucid_version="U61.fwpkg@2.00_02-01-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p>Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI ASPM to Disabled/L1 Enabled.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Added "DMI Power Management (ASPM)" option in RBSU. The option has the default value of "disable", which will override default setting of "enable" from the previous ROM. This is due to enabling DMI power management might result in system hang with machine check exception based on Intel erratum RKL-15.</p><p>The path to the option is: Processor Options -> DMI Power Management (ASPM)</p><p></p><p>This setting has the Redfish property URI of: /redfish/v1/systems/1/bios/settings/E3DmiAspm</p><p></p><p>To follow DMTF schema, change the Redfish registry version naming to have the pattern of "^\d+.\d+.\d+$".</p><p>For example, /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will now becomes /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.4 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2023-23583. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.1.1v update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7dd14e7585784238bb6caec32dcf1d80" version="c61fea6a648441a880b87329e93f60dd" lucid_version="Gen10P_Gen11_MR_Controller.win2019@7.726.1.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="7.726.1.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>7.26 Aug PA1 Drop</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.724.2.0 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support HPE ML30 and DL20 Gen11 server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eeaaff922a754e178b46a3315fd0a64a" version="b92cb52580864599b423e245df2a98c9" lucid_version="nicfwupg_intel_open.linux_x64@1.29.0(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.29.0" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product enhanced the compatibility with the latest drivers.</li>
	<li>This product enhanced the FIPs&nbsp;mode supported</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.29.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with the latest drivers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b2ba8bbc89f8475a9e824abb19fcc091" version="170e9c34bbb940bc87387543eed52e48" lucid_version="VK000240GWSRQ_VK000480GWSRR_VK000960GWSRT_x64@HPG4(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2dc80c4ae4b943faadb938f8fc2b61d5" version="b835feec525c4f11a7b3924832b5f8f1" lucid_version="iLO5.fwpkg@3.03-rev1__fwpkg-ilo_en"/>
      <revision_history>
        <revision>
          <version value="3.03" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>None.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:48px">Fixed incorrect messaging when FW update failed with BundleUpdateComponent download failure</p>

<p style="margin-left:48px">Fixed bundle update status reporting when Component download fails after all retries done.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.03" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>None.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f1a885eabd844ec18e0dab540c21f1c8" version="34e1a4d80ce7410ea22030e61e4f182a" lucid_version="VO003840XZCLT_VO007680XZCMB_MO000800XZCLQ_x64@HPD2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for SAS core dump issue in specific configuration.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ae7662457b594bb08733bceba6635c72" version="57292be8614344488b4c266dd5560e7e" lucid_version="MB012000GWDFE_x64@HPG3(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5ace706167bb418f8ac30077c43e3171" version="5fad0898ad2a40d6b0e64714de593523" lucid_version="P408i-p_P408e-p_P408i-a_P408i-c_E208i-p_x64@6.52__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="6.52" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>SR 2.8.2/SR 3.3.2 Drop1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.22" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fcc57b2588b04f54a01cb383a7a5a458" version="93ad9bf3dd784551b3f23737cfec8603" lucid_version="MB001000GWCBC_MB002000GWCBD_ESXi@HPG6(H)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="da435657efe64ff1a664870254b46a1c" version="7f94d186cd38482eb30e2cc5e96d5bc0" lucid_version="FWPKG-P23664-B21@20.40.1000__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.40.1000" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>No New features or changes have been included in version 20.40.1000.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.40.1000:</strong></p>

<ul>
	<li>RDE LLDPTransmit ChassisID was occassionally not represented correctly.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="20.39.1002" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p><strong>New features and changes included in version 20.39.1002:</strong></p>

<ul>
	<li>Get Temperature OEM command now always returns a unified temperature.</li>
	<li>Enabled Management Component Transport Protocol (MCTP) over PCIe.</li>
	<li>Added a caching mechanism to improved expansion ROM performance and to avoid any slow boot occurrences when loading the expansion ROM driver.</li>
	<li>Added new support for reserved mkey index range. When enabled, a range of mkey indexes is reserved for mkey by name use.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No new fixes have been included in version 20.39.1002.</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="02754226ca24415fbdc877dfe47af242" version="a6049989e26e44e4868a795413e2396d" lucid_version="P408i-p_P408e-p_P408i-a_P408i-c_E208i-p_x64@6.52(B)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="6.52" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support FIPS mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.22" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="31f6809eb59143388eb68360c8d0d7ac" version="b72f4dfaf5d247e1b415a08e3dc0650b" lucid_version="EK000200GWEPD_EK000400GWEPE_EK000800GWEPF_ESXi@HPG3(I)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="05aa24e5db0c41fc91f79deb60685a31" version="c18833e7189846c3ac582a4e3f8278f4" lucid_version="MM1000JFJTH_x64@HPD5(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aa9211e645514db69ecc4a92d0863429" version="fd4644ff6898456b8bf5d3a92e550bfa" lucid_version="Gen10_NVMe_Backplane_PIC.fwpkg@1.24(E)__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="1.24" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support ESXi8.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.24 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Support HPE ProLiant DL325 Gen10 Plus Server</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0134d053d49b43b1add04e5a51f6ff18" version="af3245b2ddf14a42b9731f1f7a4cfa8a" lucid_version="nicfwpkg_intel_e810_xxv2@4.30__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="4.30" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp; ResetToDefault property(RDE Port Schema).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where InterfaceEnabled property is read only and it can&#39;t patch this property</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f201f1f45a1041f9819da1901ffe255f" version="d6b6dcedbeee43f7a53ea81efd091514" lucid_version="a42.linux@3.00_01-26-2024(B)__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p>

<p>Added the System Configuration (RBSU) option &quot;Boot Options/UEFI Boot Settings/Filter Non-bootable Drives&quot; and set to &quot;Auto&quot; by default. This setting has the following Redfish property:</p>

<p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 3.00_01-26-2024.</p>

<p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors. This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors. This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers. This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575. This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_01-26-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors. This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors. This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers. This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575. This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e1ccea24a14a427dabc2aadd846feea9" version="1f4c9a2df6554218adf6c3f194864d69" lucid_version="neches.chif.win2016.x64@4.7.1.0(E)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="4.7.1.0" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1.0 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added supported_platforms tag</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="84f4d8cbba034646b75e0fce6c455870" version="bc0d12f2b45f4ab08d98a6fc0828645b" lucid_version="broadcom_nx1.win64@221.0.5.0(D)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="221.0.5.0" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="221.0.5.0 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addressed the INF install section to include correct WOL settings.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0e95d953f6c341e2ab45544cad6adaa1" version="31a1b536ab8f40d397987a038e1c58ca" lucid_version="U33.win.x64@3.10_02-22-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a436ff0616cd485d9ad02a8eddc12852" version="6b3c9b93bf504135838d5ca75eaa801f" lucid_version="MB1000GVYZE_MB2000GVYZF_MB3000GVYZH_x64@HPG5(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0e486c09859842e29ba327f60bd15f9a" version="905f7bbddf4f405fb88f24374d00586b" lucid_version="MB006000JYDNF_MB008000JYDPC_x64@HPD2(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cfa8fbdb2f4a4c81b7b1ee3f89f284e0" version="60945634830249d2a7568f80b5423750" lucid_version="u30.win.x64@3.10_02-22-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="824707fd6d4844feaef370452b0a3a3e" version="1d18c4f50d814abe8f5c5cf81f6a8487" lucid_version="U44.Linux@3.00_02-01-2024__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.

This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 05.01.04.913.<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.</p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p>Addressed an issue where system might hang while accessing IML log from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f6a0af7aeed5453599816388663b56a0" version="74298671fb154cdca8b98501e8214cf1" lucid_version="VO001920KWZQR_VO003840KWZQT_x64@HPK7(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK7" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK7" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Maintenance release with fix for LED off during idle</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e0822b357e024225a58d203426c0d686" version="740ad8d284a74465ad1812821487a0de" lucid_version="MB004000JWFVK_MB006000JWFVL_x64@HPD4(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.<br />
	&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.<br />
	&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6a4f9209b5474891beaf50886f41470e" version="5047b71579754a7695f3a7742269c40a" lucid_version="nicfwpkg_intel_e810_xxv4t@4.31__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="4.31" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp; ResetToDefault property(RDE Port Schema).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where InterfaceEnabled property is read only and it can&#39;t patch this property</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="912bdc2895264227ab4d6d2895102ac1" version="9a3028a5ba9b46d0b18a22287b2271d3" lucid_version="VO000960KXAVL_VO001920KXAVP_VO003840KXAVQ_x64@HPK5(D)__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK5 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed an incompatibility issue in MCTP over PCIe VDM function</li>
	<li>Updated WCTEMP value for thermal throttling threshold</li>
	<li>Fixed CA <a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00130699en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00130699en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5521a7a96ce64d8a92b5aab1a6147b6e" version="ebc885a1112d495f9030f0397f147aeb" lucid_version="FWPKG_MO000960RXKRC_MO001920RXKRH_MO003840RXKRK@HPD5__fwpkg-drive_en"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware version fixes a bug with the unmap command that may cause a drive hang</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a5c4c8dc7b4a47d3abf311a168b0a29d" version="296d8177bc9f487d98433a53461345b5" lucid_version="EK0800JVYPN_EO1600JVYPP_MK0800JVYPQ_MO1600JVYP_x64@HPD7(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="074cd65cf284444dbd64a63e5f809ff6" version="c0a3b0dc43404d8fbb450f68d0ff36a9" lucid_version="MB014000GWUDA_x64@HPG2(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7af1785af4fd43e38986cbbadda39482" version="24b34e20866746c492dfcb1220d61b80" lucid_version="MZXLR800HBHQ-000H3_MZXLR1T6HBJR-000H3_MZXLR3T2_x64@MPK7725Q__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="MPK7725Q" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix known FW bug PI/CI indexing issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="MPK7625Q (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA <a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0f2b8614c6ab40aea6c15cd633ff1402" version="1c3a3feec3db4df2aa993b78fff17784" lucid_version="MB001000GWJAN_MB002000GWFWA_MB004000GWFWB_ESXi@HPG1(H)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f6fccbc5aefd411688310b509bfaeaec" version="73269834f0f94bb589e95cea07f39684" lucid_version="MB018000GXMTK_MB020000GXMTQ_x64@HPG2__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Update maximum continuous operation temperature values for host thermal management and reporting.</li>
	<li>Assert fixes, logging enhancements and all current firmware improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9931ebb8026f40e8a799a9d593247da2" version="b40208ca93a1448ba4418195d6ea82fa" lucid_version="EG000600JWEBH_EG000300JWEBF_x64@HPD5(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5e23a12643374784bca02e8442853ff7" version="a3ea22bdf9d84c38a804c6611d0764da" lucid_version="MB010000JYDKK_MB012000JYCJF_MB014000JYCJV_x64@HPD3__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Assert fixes, logging enhancements and all current firmware improvements and bug fixes.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the logic bug in the media cache cleaning abort handling that caused the drive to choose and execute the R/W command before the Request Sense to prevent assert.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f2578af2166847fd869273fa7aa2c430" version="bfeb8df4bec7410f85565d786b91d6fc" lucid_version="MB006000GWBXQ_MB008000GWBYL_ESXi@HPG8(H)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e4b6ca2c49674535912553cede176d16" version="9cb49d040c46445a90f721a729bfce7a" lucid_version="VO007680JWCNK_VO015300JWCNL_ESXi@HPD8(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5e67b3914b754070a44558f816a7dbab" version="e686a4539be743c4952838bbb037bd45" lucid_version="intel_cvl.w2k19@1.13.242.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.13.242.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.164.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of CVL4.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8fe22752c5324386870794853904b4ba" version="7b859c74afa34ed88d56620e22c3f8fc" lucid_version="isut.windows_64@5.0.0.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="5.0.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="70da4993d44e45a79517f24aa5d41862" version="3b2ea2d3b4ce4d89bfaf535877275026" lucid_version="qedentv.vmware70@2024.03.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which removed all legacy RSS/DRSS module params information for ESXi 7.0 or later.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.12.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of combo image version v8.65.09.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5b139cd72d0b4c89818f276c3a1dce8c" version="cab8800eb97444ea8e8c79ec2c508b92" lucid_version="MZXL5800HBHQ-000H3_MZXL51T6HBJR-000H3_MZXL53T2_x64@MPK77H5Q__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="MPK77H5Q" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix known FW bug PI/CI indexing issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="MPK76H5Q (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA <a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9c9f3096a89f4cc7b4a9b97b01822036" version="3b328a78297541e186836d670f9516bc" lucid_version="MK000480GZXRA_MK000960GZXRB_MK001920GZXRC_x64@HPG1__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8aa4f1e30dfc4417885cea85b551314e" version="7e7e08500cc749afb99ebffe0328d291" lucid_version="iLO5_FW.LINUX@3.03-rev1__sc-linux-fw-ilo_en"/>
      <revision_history>
        <revision>
          <version value="3.03" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>None.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:48px">Fixed incorrect messaging when FW update failed with BundleUpdateComponent download failure</p>

<p style="margin-left:48px">Fixed bundle update status reporting when Component download fails after all retries done.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.03" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>None.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="54856ac460a544e2985eadac24abf907" version="a2bd1f2e40774ed4ac0ef52b7d6d86c0" lucid_version="MM2000GEFRA_x64@HPG9__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG9" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an intermittent issue where the incorrect model number can be reported during spin-up</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="da89b89bd1534fddb60af7c195cb4d11" version="e19e1202b11d45daa8716772523a1191" lucid_version="EH0300JDYTH_EH0450JDYTK_EH0600JDYTL_x64@HPD6(J)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="94af0b81860b4d31a8cc9f27961f4ea0" version="ee45624d740a454a829ab70913c9c511" lucid_version="MB1000JVYZL_MB2000JVYZN_MB3000JVYZP_x64@HPD3(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8f24173ef2e740d2b110bb710e861366" version="f2e1153535bc47de8f16fe0fab2e2e40" lucid_version="Gen10P_Gen11_hpemrsa.linux_x64@8.6.18.0__pubsw-linux_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="8.6.18.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>7.26 Dec RC Drop</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.4.16.0 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Do not allow remote access. This enhancement address the issue mentioned in a00129966en_us: HPE MR Storage Administrator (MRSA) - Remote Access is Not Supported By Default Due To Security Concerns</li>
	<li>Remove Reload function in Server Dashboard. The function is the same as browser&rsquo;s reload.</li>
	<li>Support HPE ML30 and DL20 Gen11 server.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d9e21a24798447d3b9521f317ae3815c" version="d8b220821ea149b8a3d4d37804d2042b" lucid_version="MLNX_Ethernet_Only_NIC_MFT_FW_package.esxi70@1.0.3(A)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.3" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</li>
</ul>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following changes have been made&nbsp;in sub-version 1.0.3(A):</strong></p>

<ul>
	<li>Product rebuilt to have the new SHA 384 signature.</li>
</ul>

<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device has been updated to 14.32.1010:</strong></p>

<ul>
	<li>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</li>
</ul>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="32232f7880984b91885a4743fd2f886d" version="f0f1cfe073da4a11bcb3c7f869b5e983" lucid_version="VK007680GWSXN_x64@HPG3(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d026cab87ecf46f4a70676c4643d63f0" version="5ac4a379d1ab4869ace37ded8544b460" lucid_version="MK000800KWWFE_MK001600KWWFF_MK003200KWWFH_x64@HPK3(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="421cc08cc7bc4143866089180c719d3f" version="d18c570a3d6a4c5f8d61aa8a545c032a" lucid_version="MB012000JWDFD_x64@HPD3(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8796bf21e8204a0da4179cfbcd105e85" version="1dc96ec9d59648a18e8e373c27ebef4a" lucid_version="Gen10P_Gen11_MR_Controller.rhel9.x86_64.rpm@07.726.03.00__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="07.726.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>7.26 PA1&nbsp;Drop</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="07.724.02.00 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Rebuild component&nbsp;with spec file flag addition to fix below issue and detail info can refer to&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00133943en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00133943en_us&nbsp;</a></p>

<ul>
	<li>Online Firmware update fails via OneView for MR RHEL8/9 controller components&nbsp;</li>
</ul>

<p>&nbsp;</p>

<p>Support HPE DL20 and ML30 Gen11 servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d05a1433339f497faa2734fb31c015eb" version="b06fc93be2b74133892522fcc9969323" lucid_version="MB016000GWXKK_x64@HPG4__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b6b93bd958d94fa882426d0e7804a97a" version="ca690177e4744ff3a240a6bc9fd69668" lucid_version="Apollo_2000_Gen10.Win@1.00(D)__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.00" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update build environment with SHA384</li>
	<li>Update OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.00 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added win2022 support</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="19d0fae1d2d44133a57fe6d71c8af4b7" version="e0c0620a5b354a92b0c3c7a8ccae9801" lucid_version="VO001920KYDMT_VO003840KYDMV_MO001600KYDMU_x64@HPK5__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Prioritize disabling Non-Fatal Error reporting at the beginning of FLR processing</li>
	<li>Fix known FW bug PI/CI indexing issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix bugs found in the previous version and improve on TTR (Time To Ready) requirement to fix device temporarily not found issue after hot-plug.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1abb25466c1744c190153853bc28cea5" version="5d2b9dcf1b494daa9e841849cef0d2b3" lucid_version="mlnx_en_roce_mlx5.sles15sp5.x86_64.rpm@23.10-1.1.9.1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="23.10-1.1.9.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>No changes or new features included in version 23.10-1.1.9.1.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 23.10-1.1.9.1:</strong></p>

<ul>
	<li>An error was triggered in case devlink reload was attempted when there were allocated subfunctions.</li>
	<li>Changing the steering mode to firmware steering was unsupported for policy IPsec rules.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="23.04-1.1.3.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following&nbsp;changes and new features have been included in version 23.04-1.1.3.1</strong></p>

<ul>
	<li>Starting this release, MLNX EN+RoCE&nbsp;drivers will adopt the following versioning naming scheme: YY.MM-x.x.x.x (i.e., Year.Month-x.x.x.x).</li>
	<li>Added support for allowing the host to track various statistics for the VFs, specifically all of the Q_counters stats even if he gives the VF to a VM, through the representor Q_counters for the VF which are now exposed over the host.</li>
	<li>With this feature, a kernel error log is now generated when certain fatal QP errors occur.</li>
	<li>Added support for the following operating systems:
	<ul>
		<li>RHEL 9.2</li>
		<li>RHEL 8.8</li>
		<li>SLES15-SP5</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 23.04-1.1.3.1:</strong></p>

<ul>
	<li>Installing &quot;mlnx_tune&quot; on Python3 did not work properly. &quot;mlnx_tune&quot; now supports Python3 in addition to Python2.</li>
	<li>Changing traffic class via the sysfs while modifying QPs in parallel caused a deadlock.</li>
	<li>Due to a bug in the emulation layer, performance degradation was experienced when running GPUDirect over Virtual Functions.</li>
	<li>&quot;debugfs&quot; directories could not be created for representors and sub-functions, thus the log showed error for both the scenarios.</li>
	<li>&quot;knem&quot; did not fully support RHEL8.7 and newer releases.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e6fc00ad6a3e4c539778e7419a9fafa6" version="1b0788e8ecd24c3487b91f97c7b10f3d" lucid_version="FWPKG-P31323-B21@20.40.1000__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.40.1000" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>No New features or changes have been included in version 20.40.1000.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.40.1000:</strong></p>

<ul>
	<li>RDE LLDPTransmit ChassisID was occassionally not represented correctly.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="20.39.1002" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p><strong>New features and changes included in version 20.39.1002:</strong></p>

<ul>
	<li>Get Temperature OEM command now always returns a unified temperature.</li>
	<li>Enabled Management Component Transport Protocol (MCTP) over PCIe.</li>
	<li>Added a caching mechanism to improved expansion ROM performance and to avoid any slow boot occurrences when loading the expansion ROM driver.</li>
	<li>Added new support for reserved mkey index range. When enabled, a range of mkey indexes is reserved for mkey by name use.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No new fixes have been included in version 20.39.1002.</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="43e2b01e979548ad962efb95de5a6d12" version="cf26143e945e414993bf1c5f8b709da6" lucid_version="MB2000JFEML_MB4000JFEMN_x64@HPD6(I)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="628a576c95694de3aab72daab877bb47" version="d90325a8bedb4a18a493a5640774a08b" lucid_version="MB010000JWZHA_MB012000JWZHB_MB014000JWZHC_ESXi@HPD4-rev2__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Addresses a hot plug reporting concern</li>
	<li>Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration</li>
	<li>Remove Background Media Scan (BMS) with Super parity and Directed Offline Scan (DOS)</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Addresses a hot plug reporting concern</li>
	<li>Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ff5a3639b5c744a8ac2e4611ce9482ea" version="613c027a032e4debb95b42978467977c" lucid_version="u32.linux@3.10_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="31f49e59526b43cb994f293d4205e9e6" version="7ad8b8fa4b834dab9909d56e3e49b039" lucid_version="MB012000GZYVT_MB014000GZYVU_MB016000GZYVV_ESXi@HPG4__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves data integrity.&nbsp;</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in certain error and timing conditions.&nbsp;</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide a minor performance improvement.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves data integrity</li>
	<li>Decreases&nbsp;possibility of data corruption in certain error and timing conditions</li>
	<li>Reduces the probability of hangs and provide a minor performance improvement</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="249ebde928b24f7cb7ebdd3c20053940" version="1fa0750f853b4c69b2f0f3f309c09278" lucid_version="EK000200GWEPD_EK000400GWEPE_EK000800GWEPF_EK00_x64@HPG3(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="091f1e01734d4924a66d971602e115bc" version="bd1c95f78d494a97b72495fce0464ab8" lucid_version="Gen10Plus_UBM4_Backplane_PIC@1.24(B)-rev1__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.24" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Rebuild with SHA384</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.24 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Rebuild with SHA384</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fed7882585434512b7259db2ba5790f0" version="8f0e4cca386b4e95838f8be104bff856" lucid_version="Gen10Plus_UBM1_Backplane_PIC@1.46(B)-rev1__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.46" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support SHA384</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.46 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support SHA384</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="64242f6035c24947925dbb84f5af8b24" version="52ea1f293ede4f89a5ff728ed11a56ea" lucid_version="U64.Win.x64@2.00_02-01-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p>Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI ASPM to Disabled/L1 Enabled.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Added "DMI Power Management (ASPM)" option in RBSU. The option has the default value of "disable", which will override default setting of "enable" from the previous ROM. This is due to enabling DMI power management might result in system hang with machine check exception based on Intel erratum RKL-15.</p><p>The path to the option is: Processor Options -> DMI Power Management (ASPM)</p><p></p><p>This setting has the Redfish property URI of: /redfish/v1/systems/1/bios/settings/E3DmiAspm</p><p></p><p>To follow DMTF schema, change the Redfish registry version naming to have the pattern of "^\d+.\d+.\d+$".</p><p>For example, /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will now becomes /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.4 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2023-23583. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.1.1v update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="23ed237c56c047b39f75b9977e930a45" version="a50320ace38f4f27ab155516c7ca87ab" lucid_version="MB012000JZYVN_MB014000JZYVP_MB016000JZYVQ_ESXi@HPD4__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves performance in certain file systems and implements fixes for several of the previous firmware&rsquo;s shortcomings.</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in certain error and timing conditions.</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improves data integrity</li>
	<li>Decreases&nbsp;possibility of data corruption in certain error and timing conditions</li>
	<li>Reduces the probability of hangs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cdb3eb30e49445858807ae13ca01829a" version="bc8a4605dc1e4af6a69c5c7872db6b37" lucid_version="emulex_windows_smartsan_enablement.x64@1.0.0.1(p)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.0.1" revision="p" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.1 (o)" revision="o" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="12bc299e14c0483f95f66950ee1bea77" version="e72db9ddcb5b4b628174aa920496fa5a" lucid_version="bnxt.rhel8@1.10.2-228.0.133.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.10.2-228.0.133.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.10.2-227.0.130.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product allowed GPU direct DKMS package to skip building peermem module if support already exists in kernel.</li>
	<li>This product now supported rdma driver version query from ipmi interface.</li>
	<li>This product now enabled XPS by default on driver load.</li>
	<li>This product added support for Red Hat Enterprise Linux 8.8</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed an issue that DKMS RPM packages failing to build driver.</li>
	<li>This product fixed an issue that driver and tools DKMS package unable to run POST_INSTALL script.</li>
	<li>This product fixed a hang or crash issue when running ntuple scaling tests.</li>
	<li>This product fixed a kernel panic issue when PHC UPDATE async event comes.</li>
	<li>This product fixed an kernel crash issue when SRIOV is disabled while PF is being moved from switchdev to legacy back and forth in a loop and also while set channels (ring number change) is run in a loop.</li>
	<li>This product fixed HOT Reset Timout in scaled up incremental flows.</li>
	<li>This product fixed an issue that port stop/start all in a loop triggers memory corruptions after couple of hundred iterations.</li>
	<li>This product fixed a host crash issue when adding/deleting filters with traffic.</li>
	<li>This product fixed an issue that kernel throws WARN as firmware coredump lengths differs.</li>
	<li>This product fixed a host crash issue on null pointer firmware crash when filters are being added on another host.</li>
	<li>This product fixed a system crashed issue after enabling RDMA followed by firmware reset and L2 driver unload.</li>
	<li>This product fixed warnings observed while compiling bnxt_re driver on kernel.</li>
	<li>This product fixed a system crash issue observed while running self-test on port 1 when LAG is configured.</li>
	<li>This product fixed a driver crash issue after exiting XDP mode.</li>
	<li>This product fixed a crash issue when processing PTP packets on NPAR functions.</li>
	<li>This product fixed a system crash issue while binding PF back to bnxt_en after binding it to vfio-pci and launching testpmd.</li>
	<li>This product fixed a possible SKB out-of-bounds access.</li>
	<li>This product fixed a crash issue observed while running the ethtool command while unloading the driver.</li>
	<li>This product fixed VF resource limits issue.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="21c2460d0eda43ee8d9561eb3baf6bcd" version="88798e346bba4c1db59d51fe5f60c07e" lucid_version="MB010000JWAYK_MB008000JWAYH_x64@HPD6(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="36877a0ed97d40a29cfe6cb469a6e72f" version="bb9d0b20d5af4dcf974f24544735cf90" lucid_version="u32.win.x64@3.10_02-22-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d892124a7e30440eb7f95535da6dada7" version="0aefb2470d3647d9b33f079b182fc1ef" lucid_version="i40en.vmware70@2023.10.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of FVL9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fix an issue that TCP traffic on VMs might be interrupted if PF undergoes a reset.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d8c86b5c3ce7444dbebf7bd215bf1a32" version="de99fceda02e46ce9ff8a0ad65aa91a2" lucid_version="nicfwupg_intel.linux_x64_Gen9_Gen10@1.29.0(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.29.0" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with the latest drivers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.29.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with the latest drivers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dac1034844fb4856950db71b5b2c959d" version="a95734be5bed4fa3ba0604e3fe1b8fc5" lucid_version="i40ea.w2k19@1.18.367.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.18.367.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.16.202.10" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of FVL9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="349d4407749e4a9fa71df176f3e03e78" version="7f61f5308751448bace4f95a9318bd3c" lucid_version="VK000240GWEZB_VK000480GWEZC_VK000960GWEZD_VK00_x64@HPGG(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGG" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGG (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e0d3905a13b74f06a63b96091e3a0b13" version="ac980ae606494e4198ce10a1cd8ea37e" lucid_version="FWPKG_MB006000GYDNL_MB008000GYDPE_MB010000GYDNN@HPG1__fwpkg-drive_en"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Update maximum continuous operation temperature values for host thermal management and reporting.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a32bfc6464f84b51997e9a09f493113b" version="725a6ee8e9824011a8e3f049bb37924b" lucid_version="fibreutils_x86_64.linux.SLES@4.2-1(g)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.2-1" revision="g" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This package supports only SuSE Linux Enterprise Server(SLES) Distros</p>

<p>This Component is FIPs enabled.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This Component is FIPs enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.2-1 (f)" revision="f" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This package supports only SuSE Linux Enterprise Server(SLES) Distros</p>

<p>Modified adapter support -- added 16Gb adapter support ( 1200E,1100Q single and dual adapter support )</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a5e366733eda432d8665f3d8aaa40d56" version="7ea1a127d2004b13860171e5048984d8" lucid_version="VO002000KWVVC_VO004000KWVUR_MO001600KWVUU@4ICRHPK3(F)__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4ICRHPK3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4ICRHPK3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3f857d7b01734aa494f8146516002d2e" version="22ed7097411a4230b85f21d9011f79cc" lucid_version="HPE_MR416i-p_Gen10P@52.26.3-5379__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="52.26.3-5379" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>7.26 Patch Release Beta Drop</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fix brick controller issue.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="52.26.3-5250" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>DMTF PLDM Redfish Device Enablement enhancements
	<ul>
		<li>iLO5 2.99, iLO6 1.54 or later versions are required.</li>
		<li>Added support for Chassis Data Model
		<ul>
			<li>GET Storage[Links][Enclosures]</li>
			<li>GET Chassis</li>
			<li>GET DriveCollection</li>
			<li>GET Drive[Status][State]=Absent (include empty bays under Chassis.)</li>
			<li>GET Drive[Links][Chassis]</li>
			<li>Note1: Drive URL will change to /redfish/v1/Chassis/{Id}/Drives/{Id}</li>
			<li>Note2: The empty bay resource ID is generated using &lt;Encl ID in upper byte&gt;:&lt;Bay Number in lower byte&gt;</li>
		</ul>
		</li>
		<li>Added support for Fabric Data Model
		<ul>
			<li>GET Fabric, SwitchCollection, Switch, PortCollection, Port</li>
		</ul>
		</li>
		<li>Added support the following Redfish Events
		<ul>
			<li>DriveMissing</li>
			<li>DriveMissingCleared</li>
			<li>DriveOffline</li>
			<li>DriveOfflineCleared</li>
			<li>VolumeOffline</li>
			<li>VolumeOfflineCleared</li>
		</ul>
		</li>
		<li>Added support for the following Redfish Annotations
		<ul>
			<li>@Redfish.AllowableValues (patch and post)</li>
			<li>@Redfish.AllowablePattern (patch and post)</li>
			<li>@Redfish.AllowableNumbers (patch and post)</li>
			<li>@Redfish.WriteableProperties (patch only)</li>
			<li>Note1: Any property not listed in the writeable properties list does not contain any other annotation.</li>
			<li>Note2: For VolumeCapabilities[@CapacityBytes.AllowableValues], the range is set from 1GiB to a maximum possible value of the RAID0 volume size considering the same type of the available &lsquo;n&rsquo; number of unconfigured drives. The CapacityBytes in the POST is not validated against the range in the VolumeCapabilities as the RAID Type and the number of drives, strip size and so on matter.</li>
		</ul>
		</li>
		<li>Added support for Redfish AutoVolumeCreate
		<ul>
			<li>GET/PATCH Storage[AutoVolumeCreate]</li>
			<li>MR200 will return AutoVolumeCreate=NonRAID, which remains the same as earlier firmware versions.</li>
			<li>MR400 will return AutoVolumeCreate=Disabled. Any newly added drive into a MR400 will no longer automatically appear as a JBOD and the user must configure the drive before using it.</li>
		</ul>
		</li>
	</ul>
	</li>
	<li>Added support for UBM7 backplanes</li>
	<li>Update to 2023.1 schema bundle</li>
	<li>Improve Copyback disable handling while copyback is in progress on drives</li>
	<li>Support new PSoC 6 part information display.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix a00133433en_us: HPE Compute MR Gen11 and Gen10 Plus Controllers - Controllers On HPE ProLiant AMD Gen11 Servers and Gen10Plus Servers Do Not Support Microsoft Secured-Core and AMD DMA Remapping (DMAr)</li>
	<li>Fix a00133091en_us: Storage Information Might Be Lost in iLO When Drives Are Behind MR Controllers In Passthrough Mode</li>
	<li>Fix a00134330en_us: HPE MR Gen10 Plus/Gen11 Controller - Non-Volatile Memory Express (NVMe) Drive FWPKG Flash Through HPE Integrated Lights-Out (iLO) Does Not Reflect the New Firmware Version on the Storage Page</li>
	<li>Fix an issue that NVMe passthrough command may hang when getting log page over 1MB data</li>
	<li>Fix an issue that setting JBOD shows sucessful, but JBOD does not appear to be created when all the target IDs (0 to 239) are exhausted.</li>
	<li>Fix an issue that Log Sense page 0x15 fails on ACS-5 supported SATA drive</li>
	<li>Fix an issue that crashdump.txt is taking longer than 15s to generate for ondemand snapdump</li>
	<li>Fix an issue that some snapdump prints flood the uart</li>
	<li>Fix a rare issue that logical drive data might be corrupted when expected power loss happens in the completion of copyback operation.</li>
	<li>Fix a rare issue that snapdump might not finish collecting events and generate incomplete snapdump when power off system</li>
	<li>Fix an issue that BatteryOK RDE alert was logged after every AC power cycle of the server</li>
	<li>Fix an issue that predictive failure RDE alert for a drive was logged twice on a single server reboot or controller reset</li>
	<li>Fix an issue that drive count for the enclosure might not be correct when pulling all drives simultaneously.</li>
	<li>Fix an issue that PLDM firmware update on drive fails when there are different drive models are connected to the controller</li>
	<li>Fix an issue that firmware might crash when the UBM controller is in non operational mode</li>
	<li>Fix Volume schema property IOPerfModeEnabled to be always enabled since it is dynamically decided by the controller</li>
	<li>Fix an issue that RSOD occurs when selecting the Enclosure Management for MR416i-p from System Utility Menu in ML30 Gen10 Plus</li>
	<li>Fix an issue that firmware fault might occurs when Self-Test page request is sent to the low power mode NVMe drive</li>
	<li>Fix an issue that Battery Charging Redfish Event is not generating</li>
	<li>Fix an issue that Status is not updated for the Volume resource when copyback operation is in progress</li>
	<li>Fix a rare issue that firmware fault might be observed while removing the foreign drives from the configuration</li>
	<li>Fix an issue that empty JSON PATCH request from REST client results in incorrect HTTP error code</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="139d2679780d42b2a020c2a6176ac11b" version="23e065f22ad74b7cb35687067ff44aac" lucid_version="EO000400PXDBQ_EO000800PXDCK_EO001600PXDCH_x64@HPD3(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Sever 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="916fe10c0989454da7fed6ac8080c703" version="7f3ff3f5050f4e2aaa4274a06d6d425a" lucid_version="EK000200GWEPD_EK000400GWEPE_EK000800GWEPF_EK00_x64@HPG3(K)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8ffd589c0d3c4586b8af1c72d7c3699f" version="0da24c3600da4b27a13ca250aaea5a65" lucid_version="VO001920KWVMT_VO003840KWVMU_VO007680KWVMV_x64@HPK3(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="91ee236bfbbc43019f9a1a0183e7fcbd" version="c6594dd8b4d24e528050d9047db1cbd4" lucid_version="MB6000GVYZB_MB4000GVYZA_x64@HPG5__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5d636f95f482471a9bd020c928d3b4af" version="bac4518524b14747bcd26b1e66d23dae" lucid_version="HPE_NS204i_Gen10P_Gen11@1.2.14.1013-rev1__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="1.2.14.1013" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Add @Redfish.AllowableValues, @Redfish.AllowablePattern, @Redfish.AllowableNumbers and @Redfish.WriteableProperties for Redfish Annotations</li>
	<li>Add StorageController.Links, Drive.SlotCapableProtocols and Storage.AutoVolumeCreate for Redfish GET</li>
	<li>Add StorageController.ControllerRates and Volume.DisplayName for Redfish PATCH</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed an issue that iLO reports NS204i PLDM firmware update failure, but the firmware update is actually successful and will be activated in next reboot</li>
	<li>Fixed an issue that the M.2 attached are listed in iLO Device Inventory</li>
	<li>Corrected the drive state of performing Storage.ResetToDefaults with ResetAll type</li>
	<li>Allowed empty JSON payload for SecureErase and corrected the returned status when the previous one is either in process or completed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.14.1013" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Add @Redfish.AllowableValues, @Redfish.AllowablePattern, @Redfish.AllowableNumbers and @Redfish.WriteableProperties for Redfish Annotations</li>
	<li>Add StorageController.Links, Drive.SlotCapableProtocols and Storage.AutoVolumeCreate for Redfish GET</li>
	<li>Add StorageController.ControllerRates and Volume.DisplayName for Redfish PATCH</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed an issue that iLO reports NS204i PLDM firmware update failure, but the firmware update is actually successful and will be activated in next reboot</li>
	<li>Fixed an issue that the M.2 attached are listed in iLO Device Inventory</li>
	<li>Corrected the drive state of performing Storage.ResetToDefaults with ResetAll type</li>
	<li>Allowed empty JSON payload for SecureErase and corrected the returned status when the previous one is either in process or completed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="74593c8509e24398998a42d78a910462" version="6aea8d4321e44ed6939b6ddedfdf6c0c" lucid_version="A47.fwpkg@3.00_01-26-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:
/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.
This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.
This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-27-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.



This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision provides AMD's mitigation for security vulnerabilities for CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="308794285e444711a0eb3833d54eb10e" version="8957530788b74d7c8b0b77362c945e6f" lucid_version="EH000900JWCPH_EH000600JWCPF_x64@HPDC__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDC" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize sensor reporting to improve failure rate - AFR metrics</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDB (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="25bee0f636714c0e8bface2301234fec" version="469470bc7ee0472498f0736e24002ddf" lucid_version="MLNX_VPI_CX6_HCA_MFT_FW_package.x64@1.0.0.9__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.9" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 20.40.1000:</strong></p>

<ul>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21</li>
</ul>

<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>No New features or changes have been included in version 20.40.1000.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.40.1000:</strong></p>

<ul>
	<li>RDE LLDPTransmit ChassisID was occassionally not represented correctly.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 20.37.1700:</strong></p>

<ul>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21</li>
</ul>

<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 20.37.1700:</strong></p>

<ul>
	<li>A new capability enables the VM to track and limit its Vport&#39;s activity. This is done using the new q_counters counter which enables aggregation of other Vport&#39;s from PF GVMI.</li>
	<li>Updated the link maintenance flow to avoid high uncorrectable error rate.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No new fixes have been included in version 20.37.1700</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c3e42591dc7346b48d6b9ae18a9810a3" version="a8be4b9e4b4040a48ee327e80d9d18f0" lucid_version="U50.Win.x64@2.00_02-22-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.<br />
This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel&#39;s mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.&nbsp; This issue is not unique to HPE servers.<br />
Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.<br />
Addressed an issue where NVME hot plug when installing fully loaded NVME drives.<br />
Addressed a potential security vulnerability in some 3rd and 4th Generation Intel&reg; Xeon&reg; Processors when using Intel&reg; Software Guard Extensions (SGX) or Intel&reg; Trust Domain Extensions (TDX) may allow escalation of privilege, as documented in CVE-2023-22655.<br />
Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.<br />
Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.<br />
Addressed an issue where the iSCSI SW ipv6 HDD could not be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address Type.<br />
Addressed an issue where setup options of the BIOS Configuration (RBSU) utility may not be synchronized to the latest state when a server is idle in RBSU for more than 30 minutes.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.</p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.</p><p>Addressed an issue where NVME hot plug when installing fully loaded NVME drives.</p><p>Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.</p><p>Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.</p><p>Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt > select Network device > IP Address Type.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0fb6a42a8b224caba8a145e0ac696d52" version="6d290056c4004df697bca545422afe14" lucid_version="U34.linux@3.10_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="189fb9052e994ac694bd5d6fb410f76a" version="7500d03abef048f3ac8bc98b14ffa530" lucid_version="MicroServerv2GEN10Plus_ME.fwpkg@06.00.03.604__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="06.00.03.604" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/01/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2024.1 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="06.00.03.505" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Important Notes:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Firmware Dependencies:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">None</p>

<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Enhancements/New Features:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">This version is in compliance with IPU.2023.3 guidance.</p>

<p style="margin-left:0px; margin-right:0px; text-align:start"><strong>Known Issues:</strong></p>

<p style="margin-left:0px; margin-right:0px; text-align:start">None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e98331a0655643fe8e27ef6b9d441162" version="fa429ce1a1074b1ea853c44dce0f9a47" lucid_version="smartpqi.esxi7.0_bundle@2024.04.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.04.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>SR 2.8.2/SR 3.3.2 Drop1<br />
&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.10.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed an issue when PSOD occurs while attempting to access memory which had already been released.</li>
	<li>Fixed an issue where PSOD is observed during array creation and deletion.</li>
	<li>Fixed an issue where datastore creation using logical drive from VMware client GUI is too slow.</li>
	<li>Fixed an issue where the Hotswapped HBA drives are detected after 20 minutes or when a manual rescan is done.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0c319cd0bae843d891d1e9696a4b873b" version="cb9d8a7f2982445e9d48b6b1b975873e" lucid_version="VK007680GWSXN_x64@HPG3(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8da11b65fc4a442eb7c1c3ce3ad367bb" version="517e0a1a42f7416da5d680d4ad3864dd" lucid_version="MK000480GWCEV_MK000960GWCFA_MK001920GWCFB_x64@HPG3(K)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="17be7af3223241a4bef4e8f0da8afac5" version="48ec5e52867c42038e2ad862e8f4f3ee" lucid_version="MK000480GWSSC_MK000960GWSSD_MK001920GWSSE_x64@HPG3(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4ec88340a2ce4a0da239c4051a775bd6" version="28c0674e3b5743478ef781e7f10b6858" lucid_version="VK000240GWTSV_VK000480GWTTA_VK000960GWTTB_x64@HPG7(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG7" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG7" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a false indication of rare capacitor test failure</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d313ecbde1f54151bf42ad357e6b94ad" version="7fcb24df3ae941ceb3350910286ce3c7" lucid_version="A40.Linux@3.00_01-26-2024(B)__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 3.00_01-26-2024.</p>

<p>This version of the System ROM contains updates aligned with vulnerability fixes in EDK2 NetworkPkg IP stack implementation that is described in the address <a href="https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h">https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h</a>.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_01-26-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with vulnerability fixes in EDK2 NetworkPkg IP stack implementation that is described in the address <a href="https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h">https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h</a>.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="87b9a1c22150406cbf61d6b300753282" version="205df6da3fdb439ebde7630cc20582dc" lucid_version="MB006000GWJRR_MB008000GWJRT_x64@HPG6(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer -&nbsp;Improve random mix performance in TL=2048k and 512k</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fbb53cf22a594dbb99b8c7f89e562124" version="acc53b51006844588f2d268e43704ca0" lucid_version="nicfwpkg_intel_e810_xxv2ocp@4.30__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="4.30" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp; ResetToDefault property(RDE Port Schema).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where InterfaceEnabled property is read only and it can&#39;t patch this property</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6b5a27285d114b399ac0db53bb209710" version="7b7cfd8a808246b5b7b48dbe78e3b2c0" lucid_version="VO0480JFDGT_VO0960JFDGU_VO1920JFDGV_ESXi@HPD9(F)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5156ee2ce74d4685bd9c2931c6170220" version="ca84e5bc70df4f3d9e3c491e1b263011" lucid_version="iavf.sles15@4.9.1-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9.1-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports allocating up to 256 transmit/receive queue pairs.</li>
	<li>This product now supports&nbsp;SUSE Linux Enterprise Server 15 SP5.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.9.1-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports allocating up to 256 transmit/receive queue pairs.</li>
	<li>This product now supports&nbsp;SUSE Linux Enterprise Server 15 SP5.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2e0a1ca70358499db73405a22c0ffe00" version="c1c8c6a9cebb4402adaac7b145063388" lucid_version="mlnx_en_roce_mlx5.rhel9u3.x86_64.rpm@23.10-1.1.9.1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="23.10-1.1.9.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>No changes or new features included in version 23.10-1.1.9.1.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 23.10-1.1.9.1:</strong></p>

<ul>
	<li>An error was triggered in case devlink reload was attempted when there were allocated subfunctions.</li>
	<li>Changing the steering mode to firmware steering was unsupported for policy IPsec rules.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8624b0ddbb9d42cbac863b6eec3917ae" version="7a3221cd4b5241d995b5f6c1e5b2b7d9" lucid_version="Gen10P_MR216i-p_FW_Esxi@52.26.3.5379__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="52.26.3.5379" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Test</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fix brick controller issue</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7eb6e3adc2094748b6a18ae2e5daf1e0" version="7c47eaddc5124727938525aede2241ae" lucid_version="qlogic_windows_smartsan_enablement.x64@1.0.0.1(n)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.0.1" revision="n" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.1 (m)" revision="m" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d1422347af3f4f888596c242a7fdb7a6" version="b95787266cc741c1b11bc3d428c1bcc2" lucid_version="HPE-CNA_FC-hpeqlgc-enablement@6.0.0.1-3(b)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="6.0.0.1-3" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux 9.3</p>

<p>Updated the kit to version 6.0.0.1-3</p>

<p>This component is FIPs enabled.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This component is FIPs enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.0.0.1-3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux 9.3</p>

<p>Updated the kit to version 6.0.0.1-3</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2a24f9ce00084650b7c1f83427a4e25f" version="5638e327de3d4b89a9470678145b45c8" lucid_version="MK000480GWSSC_MK000960GWSSD_MK001920GWSSE_x64@HPG3(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cd81ec29d7e54f55ab77712a180c1fe2" version="296e2147913a42c68f5d81a988f0de37" lucid_version="KCM6FRUL1T92_KCM6FRUL3T84_KCM6FVUL1T60_x64@GPK5__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="GPK5" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for BSOD issue due to SRIS misdetection and FW Commit command via PCIe VDM (MCTP OVER PCIe) timed out.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="GPK4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="56422dc0cdb64171addc0c9909a7019a" version="9be42ed7cdd8480c8a2a10c7660e390e" lucid_version="SPSGen10Plus.Win.x64@04.04.04.603__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="04.04.04.603" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This version is in compliance with IPU.2024.1 guidance.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/22/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2023-35191. This issue is not unique to HPE servers.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="04.04.04.500" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2023.3 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2fe8cdf1119641378a716d37c5e433f7" version="ffe540d3998d4981a75756fab9d8e3c4" lucid_version="EG000600JWEBH_EG000300JWEBF_ESXi@HPD5(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="009bd5d739814a67a018565d835c45f1" version="b3dadaa662ef432b9e3b9b471499b332" lucid_version="u41.win.x64@3.10_02-22-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="51c52bf006bd4c60b09797563ff886bf" version="f32669a3c4a046e59f18526c987da167" lucid_version="ssacli.linux.x64@6.30.8.0__pubsw-linux_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="6.30.8.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>for 2024 March MSB</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.25.9.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dc98cb9d9d664b55b7f0ebeb45e4e623" version="ca263eef38424c3f92f55e2d7877bc92" lucid_version="Gen10P_Gen11_MR_Controller.rhel8.x86_64.rpm@07.726.03.00__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="07.726.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>7.26 Aug PA1&nbsp;Drop<br />
&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="07.724.02.00 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Rebuild component&nbsp;with spec file flag addition to fix below issue and detail info can refer to&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00133943en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00133943en_us&nbsp;</a></p>

<ul>
	<li>Online Firmware update fails via OneView for MR RHEL8/9 controller components&nbsp;</li>
</ul>

<p>&nbsp;</p>

<p>Support HPE DL20 and ML30 Gen11 servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d780ef43938c40d3a6628583fe2200f7" version="38a629b881934aee932b4e49d3faac02" lucid_version="MB016000GWXKK_x64@HPG4(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8c2329b4625b415f9c19a0c86db985e1" version="9db8ded3612f4bf995ec64cd11e3c67c" lucid_version="neches.asr.win2022.x64@4.7.1.0(E)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="4.7.1.0" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1.0 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added supported_platforms tag</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a77901ff235c43f18df58616eefb654e" version="bb1708bdf9f7474da3abffa127860e7b" lucid_version="FWPKG-P46603-B21@22.38.1002__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="22.38.1002" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New features and changes included in version 22.38.1002:</strong></p>

<ul>
	<li>Enabled 200Gb/s out-of-the-box throughput on crypto capable devices.<br />
	Note: If any crypto offloads is in use, 200Gb/s throughput can be achieved only after the next firmware reset</li>
	<li>Added support for VF migration. The hypervisor can now suspend its VF, meaning from that point the VF cannot perform action such as&nbsp;send/receive traffic or run any command. In this firmware version only the suspend resume mode is supported (on the same VM).</li>
	<li>Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the&nbsp;hierarchy information stored on the node and the physical port.</li>
	<li>Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations&nbsp;issued by the software.<br />
	Note: If the Keep Link Up NV configuration is changed, phyless reset will be blocked.</li>
	<li>Added Precision Time Protocol (PTP) support.<br />
	In this version, the support includes:<br />
	16 PTP SQs only<br />
	only 2 ports<br />
	only RT clock mode<br />
	In this version, the following are not supported:<br />
	PTP packet drop<br />
	PTP SQ on VF<br />
	Note: All PTP SQs must be closed before operating LFWP (life fw patch).</li>
	<li>Added support for HW Steering objects dump via resource dump interface.<br />
	This support includes: STC, RTC, STE, modify argument, and modify pattern.</li>
	<li>Added support for VF migration.</li>
	<li>Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.</li>
	<li>Added support for creating a steering definer with a dword selector using create_match_definer_object and the &quot;SELECT&quot; format.</li>
	<li>Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide&nbsp;information on the syndrome type and which side caused&nbsp;the error.</li>
	<li>[Beta] Added HW Steering support for the following:<br />
	set, add and copy inline STC action<br />
	set and copy actions for several fields using modify_pattern object and inline stc modify action<br />
	FDB mode in HW steering using FDB_RX and FDB_TX flow table types<br />
	ASO flow meter action via STC<br />
	flow counter query using ASO WQE<br />
	allocation of large bulks for the objects: STE, ASO flow meter and modify argument<br />
	jumbo match RTC<br />
	count action in STC</li>
	<li>Added support for holdover mode to comply to SyncE specifications (EEC compliance) to limit the maximum phase transient response upon&nbsp;link loss.&nbsp;</li>
	<li>Added support for noise filtering to comply to the SyncE specifications requirements.</li>
	<li>Optimized the performance of vDPA virtio including: throughput, QoS, and accuracy of min/max bandwidth when virtio works with the QoS&nbsp;settings.</li>
	<li>The new vDPA virtio-net Full Emulation capability reduces the switchover time of creating a virtq from scratch during live migration, by creating the virtq beforehand on&nbsp;the target server.<br />
	When swithover happens, the pre-created virtq will be used and modified with necessary parameters.</li>
	<li>Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as&nbsp;0 anymore.</li>
	<li>Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.&nbsp;</li>
	<li>Enabled the option to modify the ip_ecn field in the packet header in firmware steering.</li>
	<li>Added support for advanced ZTR_RTTCC algorithm based on the Programmable CC platform to achieve better congestion control without&nbsp;dependency on the switch ECN marking.</li>
	<li>DIM is used to tune moderation parameter dynamically for vDPA using an mlxreg command.<br />
	To disable this capability, run:<br />
	mlxreg -d /dev/mst/mt41686_pciconf0 --reg_id 0xc00d --reg_len 0x8 -s &quot;0x4.1:1=0x0&quot;</li>
	<li>Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the&nbsp;software performs the sync operation using the using sync_steering command.</li>
	<li>Modified the maximum bulk size per single allocation from &quot;log_table_size - log_num_unisizes&quot;, to allocate any range size, to&nbsp;remove limitations that HWS objects such as counters and modify arguments might encounter.&nbsp;</li>
	<li>Added support for creating a dynamic flex parser on untrusted function, and changed the flex parser cap for untrusted function to the&nbsp;following: &nbsp;<br />
	maximum flex parser node = 2<br />
	maximum dw sample = 4</li>
	<li>Added support for SNAPI (comm-channel) connection while running on raw ETH link.</li>
	<li>Crypto features can be in either wrapped or unwrapped mode. Meaning, the key can be wrapped or in plaintext when running the&nbsp;CREATE_DEK PRM command.<br />
	To comply with the requirements specified in FIPS publication, all the created DEKs must be wrapped.<br />
	This feature adds new NV_CONFIG per device to control this mode, and enables the user to change all the crypto features to wrapped or&nbsp;cleartext.</li>
	<li>[Beta] A new capability that enables the software to directly access ICM and write/modify the DEK objects. Such change improves the DEK&nbsp;object update rate by re-using DEK object instead of creating a new one.<br />
	In addition, added the following:<br />
	New for DEK object: bulk allocation, modify_dek cmd, and new mode - sw_wrapped.<br />
	New general object INT_KEK</li>
</ul>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="22.33.1048" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New features and changes included in version 22.33.1048:</strong></p>

<ul>
	<li>Enabled 200Gb/s out-of-the-box throughput on crypto capable devices.<br />
	Note: If any crypto offloads is in use, 200Gb/s throughput can be achieved only after the next firmware reset</li>
	<li>Added support for VF migration. The hypervisor can now suspend its VF, meaning from that point the VF cannot perform action such as&nbsp;send/receive traffic or run any command. In this firmware version only the suspend resume mode is supported (on the same VM).</li>
	<li>Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the&nbsp;hierarchy information stored on the node and the physical port.</li>
	<li>Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations&nbsp;issued by the software.<br />
	Note: If the Keep Link Up NV configuration is changed, phyless reset will be blocked.</li>
	<li>Added Precision Time Protocol (PTP) support.<br />
	In this version, the support includes:<br />
	16 PTP SQs only<br />
	only 2 ports<br />
	only RT clock mode<br />
	In this version, the following are not supported:<br />
	PTP packet drop<br />
	PTP SQ on VF<br />
	Note: All PTP SQs must be closed before operating LFWP (life fw patch).</li>
	<li>Added support for HW Steering objects dump via resource dump interface.<br />
	This support includes: STC, RTC, STE, modify argument, and modify pattern.</li>
	<li>Added support for VF migration.</li>
	<li>Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.</li>
	<li>Added support for creating a steering definer with a dword selector using create_match_definer_object and the &quot;SELECT&quot; format.</li>
	<li>Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide&nbsp;information on the syndrome type and which side caused&nbsp;the error.</li>
	<li>[Beta] Added HW Steering support for the following:<br />
	set, add and copy inline STC action<br />
	set and copy actions for several fields using modify_pattern object and inline stc modify action<br />
	FDB mode in HW steering using FDB_RX and FDB_TX flow table types<br />
	ASO flow meter action via STC<br />
	flow counter query using ASO WQE<br />
	allocation of large bulks for the objects: STE, ASO flow meter and modify argument<br />
	jumbo match RTC<br />
	count action in STC</li>
	<li>Added support for holdover mode to comply to SyncE specifications (EEC compliance) to limit the maximum phase transient response upon&nbsp;link loss.&nbsp;</li>
	<li>Added support for noise filtering to comply to the SyncE specifications requirements.</li>
	<li>Optimized the performance of vDPA virtio including: throughput, QoS, and accuracy of min/max bandwidth when virtio works with the QoS&nbsp;settings.</li>
	<li>The new vDPA virtio-net Full Emulation capability reduces the switchover time of creating a virtq from scratch during live migration, by creating the virtq beforehand on&nbsp;the target server.<br />
	When swithover happens, the pre-created virtq will be used and modified with necessary parameters.</li>
	<li>Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as&nbsp;0 anymore.</li>
	<li>Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.&nbsp;</li>
	<li>Enabled the option to modify the ip_ecn field in the packet header in firmware steering.</li>
	<li>Added support for advanced ZTR_RTTCC algorithm based on the Programmable CC platform to achieve better congestion control without&nbsp;dependency on the switch ECN marking.</li>
	<li>DIM is used to tune moderation parameter dynamically for vDPA using an mlxreg command.<br />
	To disable this capability, run:<br />
	mlxreg -d /dev/mst/mt41686_pciconf0 --reg_id 0xc00d --reg_len 0x8 -s &quot;0x4.1:1=0x0&quot;</li>
	<li>Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the&nbsp;software performs the sync operation using the using sync_steering command.</li>
	<li>Modified the maximum bulk size per single allocation from &quot;log_table_size - log_num_unisizes&quot;, to allocate any range size, to&nbsp;remove limitations that HWS objects such as counters and modify arguments might encounter.&nbsp;</li>
	<li>Added support for creating a dynamic flex parser on untrusted function, and changed the flex parser cap for untrusted function to the&nbsp;following: &nbsp;<br />
	maximum flex parser node = 2<br />
	maximum dw sample = 4</li>
	<li>Added support for SNAPI (comm-channel) connection while running on raw ETH link.</li>
	<li>Crypto features can be in either wrapped or unwrapped mode. Meaning, the key can be wrapped or in plaintext when running the&nbsp;CREATE_DEK PRM command.<br />
	To comply with the requirements specified in FIPS publication, all the created DEKs must be wrapped.<br />
	This feature adds new NV_CONFIG per device to control this mode, and enables the user to change all the crypto features to wrapped or&nbsp;cleartext.</li>
	<li>[Beta] A new capability that enables the software to directly access ICM and write/modify the DEK objects. Such change improves the DEK&nbsp;object update rate by re-using DEK object instead of creating a new one.<br />
	In addition, added the following:<br />
	New for DEK object: bulk allocation, modify_dek cmd, and new mode - sw_wrapped.<br />
	New general object INT_KEK</li>
</ul>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 22.33.1048:</strong></p>

<ul>
	<li>vDPA traffic unbalance issue in active-backup VF LAG mode.</li>
	<li>Implemented SLD detection code. Surprise Down Error Reporting Capable value was changed from 1 to 0 in boards where the downstream perst was not&nbsp;controlled thus causing SLD detection not to function properly.</li>
	<li>An issue that occured after powering off DC in Multi-Host system which resulted in OOB connection to the BMC getting lost (and fatal error appeared) due to a firmware bug in the PCIe flush flow.<br />
	The issue was fixed by increasing the flush time and not waiting for PCIe credits to return to default values.</li>
	<li>A rare HW/FW timing race of serdes&#39; power-up sequence.</li>
	<li>Rare lanes skew issue that caused CPU to timeout in Rec.idle.</li>
	<li>An issue that resulted in temporary packet drops while changing PTP/FCS configuration when the links were up.</li>
	<li>Optimized the virtio data path to reach line speed for Tx bandwidth.</li>
	<li>An issue that resulted in notification indicator mistakenly being reported as FATAL thus, raising false indication.</li>
	<li>Bad cache invalidations of destroyed QPs.</li>
	<li>A configuration issue which flipped the MSB of Partition Key field in CNP packets and led to P_KEY mismatch between CNP packets and regular packets.</li>
	<li>An issue that resulted in wrong port calibration due to incorrect mapping of the port during initialization stage.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="10b8cebc40fb4b69b234ff81bd7e1d1f" version="ecb0d831fe284af79f199e2de7646291" lucid_version="DL20GEN10Plus_ME.win.x64@06.00.03.604__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="06.00.03.604" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/01/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2024.1 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="06.00.03.505" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="09b4bcb98476436f9711a4ef6ff6b585" version="8376050e32574a38abb5a8ed7a4e1130" lucid_version="EK0800JVYPN_EO1600JVYPP_MK0800JVYPQ_MO1600JVY_ESXi@HPD7(G)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d5fee9f753d04f3ba9583fdfe0002842" version="feecbf821aca4d41833df776e87b8812" lucid_version="EG0600JETKA_EG0900JETKB_EG1200JETKC_ESXi@HPD8(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d7e21057ac6640f0b343d9d0d83a30a1" version="c527fbcc1be34f33807aff20eb77d3aa" lucid_version="MB6000GVYZB_MB4000GVYZA_x64@HPG5(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="840d26617d5744de973393a116bf720d" version="7af35c5f67394c8cb73e300a13da3296" lucid_version="VO002000KWVVC_VO004000KWVUR_MO001600KWVUU_x64@4ICRHPK3(F)__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4ICRHPK3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4ICRHPK3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA <a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="957b79699cf847b3bc804b96d1108938" version="144c5d796e754bddb4249f153bb1f7cb" lucid_version="icelake.win.x64@10.1.19006.8299(B)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.1.19006.8299" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.1.19006.8299" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Chipset driver update</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7db6f792355b49a58fc4f82d6bbbdd99" version="fb5318fd819c49f08f5aa717b0d8cadd" lucid_version="U32.fwpkg@3.10_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7dbb2b9a498c4df1a461e7b3079cc8f5" version="57981234d0cb4b9a9bb75e894bc85030" lucid_version="nicfwupg_bcme.linux_x64@1.19.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.19.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed the problem of port Reset command not forcing 10G module to shut down link properly.</li>
	<li>This product fixed the problem of PFC flood if shutdown the system while running RoCE traffic.</li>
	<li>This product fixed NC-SI Get NC Capabilities and Settings response MaxPFs value.</li>
	<li>This product fixed the restriction of PF/VF bar sizes to valid values.</li>
	<li>This product fixed random Whp-livepatch failure due to out-of-order function.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.18.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed PFC flood problem when shut down system while running RoCE traffic.</li>
	<li>This product addressed PCIeVDM communication problem between BMC and NIC after an error recovery.</li>
	<li>This product addressed the PHY level packet drop.</li>
	<li>This product addressed the problem of multi-cast traffic gets leaked to unintended functions.</li>
	<li>This product addressed the reporting mechanism of NCSI max temperature.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d1880357890d41959529b109e2a869e4" version="42b40066a8dd45dc87caa8769b5d5ae0" lucid_version="MB016000JXLBA_MB018000JXLAU_x64@HPD3__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed self-initiated resetting of drives under queue full handling situations</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="18633ffffaeb4435bcda138419e66c7a" version="b43c4170b7354b668cd5ce36efbd0927" lucid_version="U34.win.x64@3.10_02-22-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="113bb71009854458ba860147296f93b4" version="6c1c1de7bd6148e48f35c7e142f26486" lucid_version="isut-esxi.esxi70@2024.03.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the <a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes</a> for information about the enhancements added&nbsp;in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the <a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes</a> for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2024.01.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the <a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes</a> for information about the enhancements added&nbsp;in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the <a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes</a> for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e2d7a4e705f34372b47092c82c533260" version="930b99ce3fad49da8f14cbd1127f38e1" lucid_version="MB6000GEBTP_x64@HPG4(J)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f7d7f54393d44f66845199e26d4e5900" version="adb423e33c8744b99571ededd1d83de7" lucid_version="EH000900JWHPK_EH000600JWHPH_ESXi@HPD8-rev2__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine &ldquo;sweeping&rdquo; of the media surface.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00127593en_us">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00127593en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine &ldquo;sweeping&rdquo; of the media surface.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="660aa31b4e5e4c7fa47517faf21f93a1" version="2805d403a00149a185e63f3564a857c9" lucid_version="MB016000GWXKK_ESXi@HPG4-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1d291170bb0944cd8d58e9257151b0f1" version="db29f8eeab014efab774e527d1a28da5" lucid_version="MO000400JWFWN_MO000800JWFWP_MO001600JWFWQ_ESXi@HPD5(H)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c47b4b11bb744418a62b9ae668fd0ea6" version="31566a22ff3e4641adcdc67859dff927" lucid_version="VO000960JWTBK_VO001920JWTBL_VO003840JWTBN_x64@HPDB__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for unrecovered errors which may occur on the targeted Blocks of Wear-leveling process when host issues Read command.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e9b531c475a54ce6b287402b5c425933" version="b91d861defa9485cb897479a980ce3c8" lucid_version="DL20ML30Gen10SPS.Linux@05.01.04.913(B)__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.913" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 05.01.04.913(B) contains updates to the firmware packaging and is functionally equivalent to ver. 05.01.04.913. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 05.01.04.913.</p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with Intel IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.913" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with Intel IPU.2023.3 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c3a161d21e2947f3af496f6cde08c95f" version="67329272c0b44dca9f1ebf6bb4e39afb" lucid_version="MB2000GFEMH_MB4000GFEMK_x64@HPG6(I)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (H)" revision="H" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.&nbsp;This issue was found during supplier ongoing reliability testing.</li>
	<li>
	<p>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="72ce2dc2a1214941a11d7ccaace19196" version="2e903b6488814d79a443135cd91fd309" lucid_version="MB012000JWDFD_ESXi@HPD3(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4e3d7926d2c648d2b99239bbce77f310" version="bb114e2e987b4fcf80cdedd02878d75d" lucid_version="MO0400JFFCF_MO0800JFFCH_MO1600JFFCK_ESXi@HPD9(F)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dcff0c4699e341cf85f18eb94d85147c" version="f6777a3f3c5a42df903398d5ca4c1aba" lucid_version="tg3.rhel9@3.139k-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.139k-1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.139j-1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="13652737a6ea4ec4a4913fd807c0a85c" version="4850220e1f564ab7b63b8bc69e5dee67" lucid_version="VO0480JFDGT_VO0960JFDGU_VO1920JFDGV_x64@HPD9(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f61d4171b71b4f16a99210ceeba911f6" version="b7a60165c2264c42968266d565bee213" lucid_version="D3000B.fwsc.esxi@6.00(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="6.00" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support of ESXi 8.0 U1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>Code optimization to save memory repo.</p>
	</li>
	<li>
	<p>TLB exception seen while doing esp reset when expander reset was in progress.</p>
	</li>
	<li>
	<p>Added the psoc 8.93 binary in peripheral images, updated the reveille version numbers.</p>
	</li>
	<li>
	<p>Added whole new Delta PS-pmbus code , Updated the ESP version number.</p>
	</li>
</ul>

<p>Please refer to the<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1808229885/v234599/20-D3000B-Gen10RN600A_ED2.html">&nbsp;<u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3fa689b1e0c54064af40f5128fac0e5b" version="7acc6ffe9f5f4cdf8b11f7fe283956c6" lucid_version="MB014000GWRTN_MB012000GWRTL_MB010000GWRTK_ESXi@HPG2(H)-rev2__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="26d6bb7ca1354a5998790d5fa42f5aa8" version="b84187a10d434c8a95dce1bc952e4a91" lucid_version="iavf.rhel8@4.9.1-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9.1-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports allocating up to 256 transmit/receive queue pairs.</li>
	<li>This product now supports Red Hat Enterprise Linux 8.8.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.9.1-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports allocating up to 256 transmit/receive queue pairs.</li>
	<li>This product now supports Red Hat Enterprise Linux 8.8.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6d5cd83fc05f4da0a652797154f87a4c" version="641e08244d024da88fc599ef8ff6273b" lucid_version="KCM6FRUL1T92_KCM6FRUL3T84_KCM6FVUL1T60@GPK5__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="GPK5" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for BSOD issue due to SRIS misdetection and FW Commit command via PCIe VDM (MCTP OVER PCIe) timed out.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="GPK4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8e8482d9e6e6494a8e54ec40143d190a" version="fd970d343d644c38a2f295993ab7e069" lucid_version="tg3.sles15@3.139k-2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.139k-2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.139j-2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 15 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="07fc1a5a961a427ba3c2e3f341d3886e" version="3ca6587ea0b949bc928a9c2a9a01cbf9" lucid_version="MB004000JWFVK_MB006000JWFVL_x64@HPD4(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0db0a980f5eb42c3bcc176643b98c5cd" version="7ca7f002e43f4c0c97e75403aa73d086" lucid_version="mlnx_mft.rhel9u2.x86_64.rpm@4.26.1-3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.26.1-3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.24.0-72" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bc93efae1dff4d8c82044eda15baf781" version="26a43ef6d1584cd0a989c17e68966d30" lucid_version="EO000400KYDKV_EO000800KYDLA@HPK4(B)__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Reverted OCP spec features to maintain compliance to OCP spec commands over NVMe-MI</li>
	<li>Implemented real Active Measured Latency by adding&nbsp;OCP 2.0 C3 Log page</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="41c374eaf1f14df3b6eb451ccf1a1aaf" version="1c84e55173b64e71bbbbba0261d7b27c" lucid_version="MB010000GWZGT_MB012000GWZGU_MB014000GWZGV_x64@HPG1(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="896b673e61904db68a62db4c589536af" version="3775a68fbbee4933acc8796aa8af31da" lucid_version="ML30GEN10Plus_ME.fwpkg@06.00.03.604__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="06.00.03.604" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/01/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2024.1 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="06.00.03.505" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="29921b6ba8e14e7cbeb3829f2308a0f5" version="b6fa13d3994c4be0b3be7ca0e581a3b0" lucid_version="HPE_SR416_SR932_Gen10P_Gen11@03.01.23.072-rev1__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="03.01.23.072" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for improving secure erase time for disks supporting the WRITE SAME command.</li>
	<li>Added support for switching persistent event log policy without clearing the existing event logs.</li>
	<li>Added support for Remote Key Management of Managed SED.</li>
	<li>Added support for 256 bytes Key Management Service (KMS) key identifier.</li>
	<li>Added support for reporting surface scan metrics for host management tools.</li>
	<li>Added support to allow re-enabling logical drive with rebuild option.</li>
	<li>Introduce an HII option labeled &#39;Configure Controller UEFI Driver Health Reporting&#39; within the &#39;Configure Controller Settings&#39; menu to provide the capability to enable or disable the reporting of configuration errors and driver health.</li>
	<li>Introduce an HII option labeled &#39;Controller Password State&#39; within the CBE (Controller-Based Encryption) settings, enabling the actions to unset, temporarily suspend, and resume the controller password.</li>
	<li>Updated the Redfish resource to align with the DMTF 2022.2 schema bundle, including the incorporation of Redfish annotations.</li>
	<li>Adjusted the severity for Redfish Volume Status.Health state and DriveOffline alert for Foreign SED.</li>
	<li>Create Redfish Volumes with a RAIDType set to &#39;None&#39; for HBA (Host Bus Adapter) drives.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed issues related to spare drive functionality.</li>
	<li>Fixed issues pertaining to Self-Encrypting Drive (SED) functionality.</li>
	<li>Fixed an issue where rebuild was being reiterated continuously and not progressing.</li>
	<li>Fixed controller detection issues during system boot, including rare cases that could lead to PSOD or RSOD errors.</li>
	<li>Fixed an issue where the SR932i-p Gen11 controller was not assigned an EID.</li>
	<li>Fixed an issue where rebuild was being reiterated continuously and not progressing.</li>
	<li>Fixed an issue where Redfish events of battery and WriteCache do not meet requirements.</li>
	<li>Fixed an issue where firmware incorrectly reported unrecoverable media errors.</li>
	<li>Fixed an issue where the surface scan progress status is displayed as &quot;In progress&quot; even after disabling the surface scan on the controller.</li>
	<li>Fixed an issue where rebuild was being reiterated continuously and not progressing.</li>
	<li>Fixed an issue related to the failure of the clear controller configuration command.</li>
	<li>Fixed an issue where an Uncorrectable error PSOD observed after power on.</li>
	<li>Fixed an issue where the Unique ID of different SATA disks is the same in Windows.</li>
	<li>Fixed an issue of power surge when too many SATA drives are spinning up simultaneously.</li>
	<li>Fixed issues where logical drives were lost after a controller reset to factory defaults, especially when the &#39;preserve logical drive&#39; option was enabled, and after an abrupt reboot where the controller reset to factory defaults, causing RAID loss.</li>
	<li>Fixed migrating a SmartCache when destination controller has existing logical drive.</li>
	<li>Fixed inaccuracies in SES enclosure behavior during hot-adding and hot-removing procedures.</li>
	<li>Fixed an issue where the controller was providing incorrect mode page information regarding the Write Cache attribute of NVMe drives.</li>
	<li>Fixed an issue causing system freezes during boot after enabling Secured-Core (DMAr) in RBSU.</li>
	<li>Fixed an issue where the BatteryMissing event was not being sent when the battery was removed prior to boot.</li>
	<li>Fixed an issue where a DriveOffline Redfish alert is not sent when a Drive resource initiated a sanitize operation.</li>
	<li>Fixed an issue where the controller&#39;s attempt to update an unflashable UBM resulted in an error report.</li>
	<li>Fixed an issue where an unflashable SMP PSOC (System Management Processor Programmable System-on-Chip) device was incorrectly appearing in the Type 5 downstream devices.</li>
	<li>Fixed an issue where driver health error messages were not displayed when the system language was changed to a non-English language.</li>
	<li>Fixed an issue of incorrectly reporting the WriteCachePolicy for a Volume resource as &quot;ProtectedWriteBack&quot; when the cache was temporarily disabled.</li>
	<li>Correct Redfish properties when backup power source is removed.</li>
	<li>Fixed an issue where the controller failed to report storage information in the absence of physical drives.</li>
	<li>Fixed an issue where an unexpected &#39;BatteryCharging&#39; event was reported when no battery was present.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="03.01.23.072" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Added Gen11 support</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7163f5a35db04c1899f77a9e771fd83e" version="2e64d8eee48f46998c89bf93324d4131" lucid_version="EG000300JWFVB_x64@HPD3(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6e357a862ebf4f379b5f531a7eb46680" version="37f33473d92946c0a11ccf553d25a5ed" lucid_version="SPSGen10Plus.fwpkg@04.04.04.603__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="04.04.04.603" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This version is in compliance with IPU.2024.1 guidance.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/22/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2023-35191. This issue is not unique to HPE servers.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="04.04.04.500" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2023.3 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eafab624995d485096ba1119b617b464" version="bcd5aabfbcaa498c8a971f391d4ef6ec" lucid_version="netxtreme2.sles15@7.15.17-1(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="7.15.17-1" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with Linux firmware component 2.34.0.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.15.17-1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product adds support for SUSE Linux Enterprise Server 15 SP5</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="321dd379dd1a436ab919b4529b332ece" version="f9c673ba76db4ec8879915be515682b9" lucid_version="U43.win.x64@3.00_02-01-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.

This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 05.01.04.913.<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.</p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p>Addressed an issue where system might hang while accessing IML log from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7b0103ddf3b44215b7f92f0c298c391f" version="827f86162a8a40a296db78a2515e169a" lucid_version="nmlx4_en.vmware70@2023.09.13__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.09.13" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New Features in version 3.19.70.2001:</strong></p>

<ul>
	<li>Added support for host seeding for ESXi 7.0.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No fixes are&nbsp;included in version 3.19.70.2001:</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.11.11 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes have been made&nbsp;in sub-version 2020.11.11(B):</strong></p>

<ul>
	<li>Product rebuilt to have the new SHA 384 signature.</li>
</ul>

<p><strong>Changes and New Features in version 3.19.70.1:</strong></p>

<ul>
	<li>Resolved an issue that caused the network adapter traffic to stop.</li>
	<li>Fixed an internal multicast loopback issue that broke LACP(Link Aggregation Control Protocol) bonding protocol.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No fixes are&nbsp;included in version 3.19.70.1:</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="92d52e2161c24f8f9ff633da842f814c" version="67490caa67b74aed8d0f7c0e9bc224a5" lucid_version="KCD6XVUL800G_KCD6XVUL1T60_KCD6XVUL3T20@GPK7__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="GPK7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for BSOD issue due to SRIS misdetection and FW Commit command via PCIe VDM (MCTP OVER PCIe) timed out.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="GPK6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eacabd6c758c41759c1c132130d3f614" version="20d1db45ea18495c9daeb6ad23efad44" lucid_version="VO000960KXAVL_VO001920KXAVP_VO003840KXAVQ@HPK5(C)__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed an incompatibility issue in MCTP over PCIe VDM function</li>
	<li>Updated WCTEMP value for thermal throttling threshold</li>
	<li>Fixed CA <a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00130699en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00130699en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ed78d2df04834204b8977e0aaa96c64a" version="2a12c219a1f042489cd3925645f1ac5b" lucid_version="i40eb.w2k19@1.18.367.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.18.367.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.16.202.10" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of FVL9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="66a1346762c14adc98a81649c4277c93" version="65f22bdf172d4726b2a115a66b077968" lucid_version="MB010000GYDKP_MB012000GYCJL_MB014000GYCJT_ESXi@HPG2__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Update maximum continuous operation temperature values for host thermal management and reporting.</li>
	<li>Assert fixes, logging enhancements and all current firmware improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="96fe9c5a9b9741d5bcf4ae73623359e0" version="3c80b57b2b84461ea4800ef60e89f6a3" lucid_version="FWPKG-P31246-B21@16.35.3006(A)__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="16.35.3006" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Important : Security Hardening Enhancements - This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device firmware to this version to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 16.35.3006(A):</strong></p>

<ul>
	<li>Component rebuilt to set the &#39;ResetRequired&#39;, &#39;SysPowerON&#39; parameter values to &#39;true&#39; in the included payload.json file. This will help SUM categorize the component appropriately for deployment in SPP, and display the correct user prompt after firmware component execution.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="16.35.3006" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Important : Security Hardening Enhancements - This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device firmware to this version to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="365d207e25654d61b3829f731965d204" version="ad8f316a76db49fba8a6a2414d24cfac" lucid_version="EH000900JWCPH_EH000600JWCPF_x64@HPDC(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDC" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDC" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize sensor reporting to improve failure rate - AFR (Annual Failure Rate) metrics</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f4d3c3f0b12d4c1da09c3d11188e06cf" version="0ef2839e6aac4d55a4de9900ac519f53" lucid_version="VS000480KXALB_VS001920KWXFP_VS000960KWXFN_x64@85032G00(E)__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="85032G00" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="85032G00 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bd2780f798b64cefbb3916c847ffd755" version="60b126979fa84184871a1851b5bae8bb" lucid_version="qlogic.online.fw.esxi80_rt@2023.10.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR">Adapter</p>
			</td>
			<td>
			<p dir="LTR">Speed</p>
			</td>
			<td>
			<p dir="LTR">MBI</p>
			</td>
			<td>
			<p dir="LTR">Firmware</p>
			</td>
			<td>
			<p dir="LTR">UEFI</p>
			</td>
			<td>
			<p dir="LTR">Boot Bios</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.09.07</p>
			</td>
			<td>
			<p dir="LTR">09.14.01</p>
			</td>
			<td>
			<p dir="LTR">7.36</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.09.07</p>
			</td>
			<td>
			<p dir="LTR">09.14.01</p>
			</td>
			<td>
			<p dir="LTR">7.36</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.09.07</td>
			<td>09.14.01</td>
			<td>7.36</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.09.07</td>
			<td>09.14.01</td>
			<td>7.36</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR">Adapter</p>
			</td>
			<td>
			<p dir="LTR">Speed</p>
			</td>
			<td>
			<p dir="LTR">MBI</p>
			</td>
			<td>
			<p dir="LTR">Firmware</p>
			</td>
			<td>
			<p dir="LTR">UEFI</p>
			</td>
			<td>
			<p dir="LTR">Boot Bios</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.08.05</p>
			</td>
			<td>
			<p dir="LTR">09.12.01</p>
			</td>
			<td>
			<p dir="LTR">7.34</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.08.05</p>
			</td>
			<td>
			<p dir="LTR">09.12.01</p>
			</td>
			<td>
			<p dir="LTR">7.34</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.08.05</td>
			<td>09.12.01</td>
			<td>7.34</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.08.05</td>
			<td>09.12.01</td>
			<td>7.34</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>

<p>Non-disruptive firmware upgrades: non-disruptive firmware updates is enabled and will not require a server reboot to apply.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following behavior:</p>

<p>Temperature Misreading: the adapter was reading incorrect reading of the temperature on the HPE SN1610Q 32Gb Fibre Channel Host Bus adapter&#39;s Small Form-factor Pluggable. The symptom would result in a temperature spike and potentially reset the system</p>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f0e80dda550e422981f666fd854cb6f6" version="f5562a5186b54f7292e04ed662d899de" lucid_version="MO000800JXBEV_MO001600JXBFP_MO003200JXBFQ_x64@HPD1(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="57a91e286d3e413c8468376551e64001" version="095a024a5371407cb7df6100a4f5c0ab" lucid_version="MB001000GWFWK_MB002000GWFWL_x64@HPG6(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="29b23e8f7b0d4dbf97ddc41ea0425103" version="3ecf7673f84a49f9bf91e9d8bc36f1c9" lucid_version="FWPKG_MB020000JXMVU@HPD1__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>* An error was found in the queue fullhandling process that results in the FUA bit not getting properly set, which could lead to the drive self-initiated reset</p>

<p>* The FW fix is to resolve the handling of FUA bit during the queue full handling process has been implemented</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="38b83226aeb64480960e8558ac22cab4" version="5bb87256fee84a5da3e6a3f5fe59a295" lucid_version="qfle3.vmware70@2024.03.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with VMware firmware component 1.3.4.0.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with Firmware</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="58058fc7c39a49caa2844dbe139ab3f9" version="d571fb00d7f64e8c9312b3d0ca2810ec" lucid_version="EG001800JWJNR_EG002400JWJNT_EG002400MXJQT_ESXi@HPDA(B)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDA (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3eab1bf1c35b40e5b35b9f8cbcf441cd" version="619765e88e494197b9c7940f4b386083" lucid_version="ML30GEN10Plus_ME.linux@06.00.03.604__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="06.00.03.604" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/01/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2024.1 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="06.00.03.505" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b50552ebf09d445294b0b81e162643cf" version="3cb70a09ecfb454ba0bebec7cecba38a" lucid_version="FWPKG-P42044-B21@26.39.1002__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="26.39.1002" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.<br />
<strong>New features and changes included in version 26.39.1002:</strong></p>

<ul>
	<li>Updated the number of channels (ports) that are displayed in the iLO from 1 to 2 (num_channels_per_pkg=2) for dual port adapter cards.</li>
	<li>Added a locking mechanism to protect the firmware from a race condition between insertion and deletion of the same rule in parallel. Such behavior occasionally resulted in firmware accessing a memory that has already been released, thus causing IOMMU / translation error.</li>
</ul>

<p style="margin-left:40px">Note: This change will not impact insertion rate for tables owned by SW steering.</p>

<ul>
	<li>Added a caching mechanism to improved expansion ROM performance and to avoid any slow boot occurrences when loading the expansion ROM driver.</li>
	<li>Added support for image size above 4GB when performing a live migration by splitting the image to chunks.</li>
	<li>Extended the role-based authentication to cover all crypto algorithms. Now the TLS. IPsec. MACsec. GCM, mem2mem, and NISP work when nv_crypto_conf.crypto_policy = CRYPTO_POLICY_FIPS_LEVEL_2, meaning all cryptographic engines can also work in wrapped mode and not only in plaintext mode.</li>
	<li>Programmable Congestion Control is now the default CC mechanism. ZTR_RTTCC is the default CC algorithm when ECE is enabled and the CC algorithm negotiation succeeds, otherwise PCC DCQCN will be used.</li>
	<li>Added new support for reserved mkey index range. When enabled, a range of mkey indexes is reserved for mkey by name use.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 26.39.1002:</strong></p>

<ul>
	<li>Migration data corruption occurred when running parallel save_vhca_state/load_vhca_state commands on the same PF.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="26.37.1700" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New features and changes included in version 26.37.1700:</strong></p>

<ul>
	<li>Modified the RDE behavior to return an error if the chassis ID subtype is AgentId, or Port ID subtype is ChassisComp.</li>
	<li>Enabled VF LAG hash mode. The LAG_RESOURCE_ALLOCATION mlxconfig field is now modifiable.</li>
	<li>A new capability enables the VM to track and limit its Vport&#39;s activity. This is done using the new q_counters counter which enables aggregation of other Vport&#39;s from PF GVMI.</li>
	<li>Added a flow rule that enables offloading of multicast traffic by broadcasting it to multi-Flow-Table in FDB.</li>
	<li>Enables a smooth and statically switch between PCC algorithms. In addition, the user can now switch between PCC algorithms while running traffic.</li>
	<li>Added support for 32 actions in the header modify pattern using bulk allocation.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 26.37.1700:</strong></p>

<ul>
	<li>An issue that prevented the adapter card from handling WoL packets when the host powered up directly into the standby mode.</li>
	<li>CNP received, handled, and ignored counters in the hardware counters could not work after moving to Programmable Congestion Control mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4aaa1b96312a4790820f2c40ac3eb0e7" version="772ed6f9e13342219c4a886a7d22fb04" lucid_version="MM1000JFJTH_ESXi@HPD5(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Vmware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2ce3ac2092b94fa1b8631b7964992fb7" version="da363286751d4f2fad9f1ee9e212de97" lucid_version="VO007680JWCNK_VO015300JWCNL_x64@HPD8(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e9a54d5b255e4c18936eebffaaff1ccf" version="28aefcf2e04d4d839479a2d17c766b5b" lucid_version="ams.win.x64@2.51.4.2__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.51.4.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Removed files based on&nbsp;CVE-2020-14152, CVE-213-6629.</li>
	<li>Removed workload log page check to prevent SSD device lifetime.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed AMS crashed issue caused by non-ASCII code set environment.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.51.4.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Supported HPE Apollo 6500 Gen10 Plus.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed AMS crash during session communication&nbsp;error with iLO.</li>
	<li>Fixed IML missing when network status changed from disabled to enabled.</li>
	<li>Fixed sending unsupported identify command to ODD.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3d8cb748df644cf3a26ed91efafffb67" version="475c525ff88b4b9f915094694f904818" lucid_version="smartpqi.rhel9_x86_64.rpm@2.1.26-030__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.1.26-030" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>SR 2.8.2/SR 3.3.2 Drop1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.1.24-046" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="436670aad3944dd794f4bdcf4feb2b72" version="32594deb37c6459293edf45687c00f41" lucid_version="MO0400JFFCF_MO0800JFFCH_MO1600JFFCK_x64@HPD9(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aeed5dab678d4be3a85806ba9711f37a" version="7fa67cf0a9fe447d8ab2f192182498fa" lucid_version="VK0400JEABD_VK0800JEABE_VO1600JEABF_x64@HPD4(E)__sc-linux-fw-drive_en"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="000bfbde35e84381b78976b2c1748662" version="79846716b3004573a438dbb1a082ccb7" lucid_version="intel_vf.w2k22@1.14.201.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.14.201.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.13.8.0 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which the component can&#39;t read the current driver version.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8c0c47d5bf1446e88cb749de3c7fd2d0" version="cd9d638a29834a29abf4b4d8915e76a8" lucid_version="VK000240GWEZB_VK000480GWEZC_VK000960GWEZD_VK00_x64@HPGG(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGG" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGG (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="86420e4b9b414e61bd5c2f06d883ac98" version="f5a24ed4e5ef44f0b44e395bf0d7cd4c" lucid_version="MB002000JYDNE_MB004000JYDPB_ESXi@HPD2(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b24d5f9d7d1b43c1891a12ff33223756" version="fa1d4d8a4a6647449a4be32fa09376ec" lucid_version="EG0600JETKA_EG0900JETKB_EG1200JETKC_x64@HPD8(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6d1ce52e0d6c4c48a4cc6f903852d87d" version="e390b6e5620c42f894cce0a536cda31f" lucid_version="U47.Win.x64@2.00_02-22-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.<br />
This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel&#39;s mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.&nbsp; This issue is not unique to HPE servers.<br />
Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.<br />
Addressed an issue where NVME hot plug when installing fully loaded NVME drives.<br />
Addressed a potential security vulnerability in some 3rd and 4th Generation Intel&reg; Xeon&reg; Processors when using Intel&reg; Software Guard Extensions (SGX) or Intel&reg; Trust Domain Extensions (TDX) may allow escalation of privilege, as documented in CVE-2023-22655.<br />
Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.<br />
Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.<br />
Addressed an issue where the iSCSI SW ipv6 HDD could not be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address Type.<br />
Addressed an issue where setup options of the BIOS Configuration (RBSU) utility may not be synchronized to the latest state when a server is idle in RBSU for more than 30 minutes.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.</p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.</p><p>Addressed an issue where NVME hot plug when installing fully loaded NVME drives.</p><p>Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.</p><p>Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.</p><p>Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt > select Network device > IP Address Type.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c07f99c2b0d248348543770e8f33efd1" version="991379a580874d5c89bda1321dd852c2" lucid_version="qla2xxx.driver.esxi70.zip_rt@2023.10.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 5.3.82.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 5.3.81.2-1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="15d448815a234025a6958f5176b1dc77" version="3d4a6de60d3c4bbe95142d57c6b6423c" lucid_version="MLNX_VPI_CX4_CX5_HCA_FW_package.esxi70@1.0.6__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.6" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)</li>
	<li>825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been&nbsp;updated to 16.35.3006:</strong></p>

<ul>
	<li>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)</li>
	<li>872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)</li>
</ul>

<p>Important : Security Hardening Enhancements - This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device firmware to this version to improve the firmware security and reliability of your device.</p>

<p><strong>New Features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version&nbsp;12.28.2006:</strong></p>

<ul>
	<li>Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)</li>
	<li>825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
	&nbsp;</li>
</ul>

<p><strong>Firmware for the following devices has been&nbsp;updated to 16.35.1012:</strong></p>

<ul>
	<li>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)</li>
	<li>872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New Features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 16.35.1012:</strong></p>

<ul>
	<li>Added support for copy modify header steering action to/from the UDP field.</li>
	<li>Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.</li>
	<li>QoS priority trust default state can now be changed using the new nvconfig below:
	<ul>
		<li>QOS_TRUST_STATE_P1</li>
		<li>QOS_TRUST_STATE_P2</li>
	</ul>
	</li>
</ul>

<p style="margin-left:40px">The values that can be used to set the default state are:</p>

<ul style="margin-left:40px">
	<li>TRUST_PORT</li>
	<li>TRUST_PCP</li>
	<li>TRUST_DSCP</li>
	<li>TRUST_DSCP_PCP</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 12.28.2006:</strong></p>

<ul>
	<li>Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.1012:</strong></p>

<ul>
	<li>RDE (Redfish) PATCH operation to LLDPTransmit properties &quot;ManagementAddressIPv4&quot;, &quot;ManagementAddressIPv6&quot; and &quot;ManagementAddressMAC&quot; were applied only in the first attempt, but failed in the next.</li>
	<li>PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.</li>
	<li>Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions.&nbsp;</li>
	<li>InfiniBand L2 QP could not receive RDMA traffic occasionally.</li>
	<li>Running with a debug firmware reduced security as if token was applied.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ab42380273374a988dbcb1a25432ed96" version="bbeac6ce83224e4990d198af58381c0b" lucid_version="FWPKG-P31324-B21@20.40.1000__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.40.1000" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>No New features or changes have been included in version 20.40.1000.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.40.1000:</strong></p>

<ul>
	<li>RDE LLDPTransmit ChassisID was occassionally not represented correctly.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="20.39.1002" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p><strong>New features and changes included in version 20.39.1002:</strong></p>

<ul>
	<li>Get Temperature OEM command now always returns a unified temperature.</li>
	<li>Enabled Management Component Transport Protocol (MCTP) over PCIe.</li>
	<li>Added a caching mechanism to improved expansion ROM performance and to avoid any slow boot occurrences when loading the expansion ROM driver.</li>
	<li>Added new support for reserved mkey index range. When enabled, a range of mkey indexes is reserved for mkey by name use.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No new fixes have been included in version 20.39.1002.</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="77f2ff3d7ebf4999a5ec47887c09ecdf" version="8750f27937ae403ebec4247f96500484" lucid_version="MZPLJ1T6HBJR-000H3_MZPLJ3T2HBJR-000H3_MZPLJ6T_x64@EPK76H3Q(D)__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="EPK76H3Q" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="EPK76H3Q (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA <a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us" style="color:#0563c1; text-decoration:underline">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="716670787e144aa5b4cf080bc78d2ef7" version="d0e718a9978e44e6b7e76ed2f07dd6a5" lucid_version="U64.Linux@2.00_02-01-2024__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p></p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p>Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI ASPM to Disabled/L1 Enabled.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Added "DMI Power Management (ASPM)" option in RBSU. The option has the default value of "disable", which will override default setting of "enable" from the previous ROM. This is due to enabling DMI power management might result in system hang with machine check exception based on Intel erratum RKL-15.</p><p>The path to the option is: Processor Options -> DMI Power Management (ASPM)</p><p></p><p>This setting has the Redfish property URI of: /redfish/v1/systems/1/bios/settings/E3DmiAspm</p><p></p><p>To follow DMTF schema, change the Redfish registry version naming to have the pattern of "^\d+.\d+.\d+$".</p><p>For example, /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will now becomes /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2023.4 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2023-23583. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p></p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.1.1v update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="09fdb681b4924b8992d4cc199252815c" version="c84c21b2abb9474cae32c1d71b4e9b9a" lucid_version="SmartDQ.win2022@1010.14.0.0(C)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1010.14.0.0" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update build environment with SHA384</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1010.14.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f09974e786ab4852855854b483956c19" version="ec423a76ecd349e8b113337389aac3fb" lucid_version="ET000750KWJTF_EO000750KWTXC_EO000375KWJUC@4ICSHPK4(F)__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4ICSHPK4" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4ICSHPK4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="14bdb24247e844e783ad854d474aa245" version="804cb370947b47bea1e801be2e697d32" lucid_version="lpfc.driver.esxi70.zip_rt@2023.09.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.09.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 14.2.567.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.03.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 14.0.543.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5525dd3ac4024adeb1f8ec72b9fd1236" version="a8d72067f0bb449b8af3557fd22fce67" lucid_version="EG001800JWJNL_EG002400JWJNN_x64@HPD5(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="955cffa0d4fe4b76923c0ea7afeca0bf" version="5f611f1fbee64be68212a8f0125361dd" lucid_version="nicfwpkg_intel_e810_xxv4@4.30__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="4.30" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp; ResetToDefault property(RDE Port Schema).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where InterfaceEnabled property is read only and it can&#39;t patch this property</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5f7dae044b3b4d97823b1cfc69305837" version="e565081ced0c43e9b680dd73895f9e1a" lucid_version="nicfwupg_qlnx2.linux_x64@2.34.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="2.34.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue that FCoE Boot Target issue.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.33.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with drivers</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="614a0c688deb4def90dafbe34fab64bb" version="83d93bfe6a6f4743af4188446cc44782" lucid_version="smartpqi.esxi8.0_bundle@2024.04.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.04.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>SR 2.8.2/SR 3.3.2 Drop1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.10.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed an issue when PSOD occurs while attempting to access memory which had already been released.</li>
	<li>Fixed an issue where PSOD is observed during array creation and deletion.</li>
	<li>Fixed an issue where datastore creation using logical drive from VMware client GUI is too slow.</li>
	<li>Fixed an issue where the Hotswapped HBA drives are detected after 20 minutes or when a manual rescan is done.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="193fefc836ff47bc98df145955f3145a" version="8f3a7de453c74413ad72d09c2a0c4861" lucid_version="MB2000JFEML_MB4000JFEMN_ESXi@HPD6(L)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (K)" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="260b73b77b824e60a7231a400ce24c25" version="538b6b0daa6f48be945e022a1942b9a0" lucid_version="MB004000GWWQH_MB002000GWWQF_MB001000GWWQE_x64@HPG6__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Update maximum continuous operation temperature values for host thermal management and reporting.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dcd60b858b6c4ac298dc49b61299aeb5" version="b286d33666674856aa258f83cd8a2259" lucid_version="nicfwupg_qlflq.win64@5.3.5.50__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.3.5.50" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.3.3.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where Max Number of Virtual Machine Queues/Physical Function shows zero value in AHS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1f3d9896fbab4dc5aed295b2183323a0" version="32ade9c7efdc42ce9f6734557cb40668" lucid_version="U46.win.x64@2.00_03-06-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_03-06-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.<br />
This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel&#39;s mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.&nbsp; This issue is not unique to HPE servers.<br />
Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.<br />
Addressed an issue where NVME hot plug when installing fully loaded NVME drives.<br />
Addressed a potential security vulnerability in some 3rd and 4th Generation Intel&reg; Xeon&reg; Processors when using Intel&reg; Software Guard Extensions (SGX) or Intel&reg; Trust Domain Extensions (TDX) may allow escalation of privilege, as documented in CVE-2023-22655.<br />
Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.<br />
Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.<br />
Addressed an issue where the iSCSI SW ipv6 HDD could not be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address Type.<br />
Addressed an issue where setup options of the BIOS Configuration (RBSU) utility may not be synchronized to the latest state when a server is idle in RBSU for more than 30 minutes.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00_03-06-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.</p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.</p><p>Addressed an issue where NVME hot plug when installing fully loaded NVME drives.</p><p>Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.</p><p>Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.</p><p>Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when iSCSI IP Address Type option is set to “Auto” in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt > select Network device > IP Address Type.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b75caf763a204707bef1840fcde5be6a" version="7326920731fb4fbe8fc5c1297853e3f2" lucid_version="switchtec.pciesw.win2022.x64@1.0.0.0(B)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.0" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update version</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cdfe3840d6074900a4d11b774d3e5307" version="327defbf061249a3afac98c58a3e0a03" lucid_version="MLNX_VPI_CX4_CX5_HCA_FW_package.x64@1.0.0.14__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.14" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)</li>
	<li>825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been&nbsp;updated to 16.35.3006:</strong></p>

<ul>
	<li>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)</li>
	<li>872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)</li>
</ul>

<p>Important : Security Hardening Enhancements - This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device firmware to this version to improve the firmware security and reliability of your device.</p>

<p><strong>New Features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version&nbsp;12.28.2006:</strong></p>

<ul>
	<li>Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.13" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)</li>
	<li>825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
	&nbsp;</li>
</ul>

<p><strong>Firmware for the following devices has been&nbsp;updated to 16.35.1012:</strong></p>

<ul>
	<li>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)</li>
	<li>872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New Features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 16.35.1012:</strong></p>

<ul>
	<li>Added support for copy modify header steering action to/from the UDP field.</li>
	<li>Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.</li>
	<li>QoS priority trust default state can now be changed using the new nvconfig below:
	<ul>
		<li>QOS_TRUST_STATE_P1</li>
		<li>QOS_TRUST_STATE_P2</li>
	</ul>
	</li>
</ul>

<p style="margin-left:40px">The values that can be used to set the default state are:</p>

<ul style="margin-left:40px">
	<li>TRUST_PORT</li>
	<li>TRUST_PCP</li>
	<li>TRUST_DSCP</li>
	<li>TRUST_DSCP_PCP</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 12.28.2006:</strong></p>

<ul>
	<li>Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.1012:</strong></p>

<ul>
	<li>RDE (Redfish) PATCH operation to LLDPTransmit properties &quot;ManagementAddressIPv4&quot;, &quot;ManagementAddressIPv6&quot; and &quot;ManagementAddressMAC&quot; were applied only in the first attempt, but failed in the next.</li>
	<li>PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.</li>
	<li>Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions.&nbsp;</li>
	<li>InfiniBand L2 QP could not receive RDMA traffic occasionally.</li>
	<li>Running with a debug firmware reduced security as if token was applied.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6d5b098230e341e9881e9381bf19ba96" version="61f3dfbac51742d0a5332631a25b40b0" lucid_version="iavf.rhel9@4.9.1-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9.1-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports allocating up to 256 transmit/receive queue pairs.</li>
	<li>This product now supports&nbsp;Red Hat Enterprise Linux 9.2.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.9.1-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports allocating up to 256 transmit/receive queue pairs.</li>
	<li>This product now supports&nbsp;Red Hat Enterprise Linux 9.2.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="02e2779ea258441c8ba6426a8772f536" version="09d55bad090b45e890f9528dcaad86a8" lucid_version="lpfc.rhel9.x86_64@14.2.589.21(b)__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="14.2.589.21" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>

<p>The Driver is FIPs Enabled</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p _msthash="125" _msttexthash="882999">The Driver Component is FIPs Enabled</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="14.2.589.21" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<p>RedHat Enterprise Linux&nbsp;8.9</p>

<p>RedHat Enterprise Linux&nbsp;9.3</p>

<p>Updated to driver version 14.2.589.21-1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c20869f6e72044ccb4d2b142b029a1ef" version="858442d31bcd4094b64ed19bb9888dce" lucid_version="MB001000GWJAN_MB002000GWFWA_MB004000GWFWB_x64@HPG1(K)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="605b084308a74c74a0091e855e41c6f1" version="2725b4a1c41148f499d80c965f5f705b" lucid_version="MLNX_VPI_CX4_CX5_HCA_FW_package.esxi8.0@1.0.2__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)</li>
	<li>825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been&nbsp;updated to 16.35.3006:</strong></p>

<ul>
	<li>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)</li>
	<li>872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)</li>
</ul>

<p>Important : Security Hardening Enhancements - This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device firmware to this version to improve the firmware security and reliability of your device.</p>

<p><strong>New Features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version&nbsp;12.28.2006:</strong></p>

<ul>
	<li>Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 12.28.2006:</strong></p>

<ul>
	<li>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)</li>
	<li>825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
	&nbsp;</li>
</ul>

<p><strong>Firmware for the following devices has been&nbsp;updated to 16.35.1012:</strong></p>

<ul>
	<li>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)</li>
	<li>872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New Features and changes included in version 12.28.2006:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 16.35.1012:</strong></p>

<ul>
	<li>Added support for copy modify header steering action to/from the UDP field.</li>
	<li>Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.</li>
	<li>QoS priority trust default state can now be changed using the new nvconfig below:
	<ul>
		<li>QOS_TRUST_STATE_P1</li>
		<li>QOS_TRUST_STATE_P2</li>
	</ul>
	</li>
</ul>

<p style="margin-left:40px">The values that can be used to set the default state are:</p>

<ul style="margin-left:40px">
	<li>TRUST_PORT</li>
	<li>TRUST_PCP</li>
	<li>TRUST_DSCP</li>
	<li>TRUST_DSCP_PCP</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 12.28.2006:</strong></p>

<ul>
	<li>Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.1012:</strong></p>

<ul>
	<li>RDE (Redfish) PATCH operation to LLDPTransmit properties &quot;ManagementAddressIPv4&quot;, &quot;ManagementAddressIPv6&quot; and &quot;ManagementAddressMAC&quot; were applied only in the first attempt, but failed in the next.</li>
	<li>PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.</li>
	<li>Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions.&nbsp;</li>
	<li>InfiniBand L2 QP could not receive RDMA traffic occasionally.</li>
	<li>Running with a debug firmware reduced security as if token was applied.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a2bc84f793fd4972b6196baf3df85eb6" version="f68adbaf12744e498d10c61acad7f532" lucid_version="MB014000JWUDB_ESXi@HPD3(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1359633a2c01457995b30369968ffed3" version="21a6dda3d851475fa637378f2c364143" lucid_version="VO000960KWUEA_VO001920KWUEB_VO003840KWUEC_ESXi@HPK2(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2ff7bda808684e609f303a4496ed09e6" version="43a6003a85514fe6a852cb90981bf6a4" lucid_version="mlnx_en_roce_mlx5.rhel8u8.x86_64.rpm@23.10-1.1.9.1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="23.10-1.1.9.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>No changes or new features included in version 23.10-1.1.9.1.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 23.10-1.1.9.1:</strong></p>

<ul>
	<li>An error was triggered in case devlink reload was attempted when there were allocated subfunctions.</li>
	<li>Changing the steering mode to firmware steering was unsupported for policy IPsec rules.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="23.04-1.1.3.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following&nbsp;changes and new features have been included in version 23.04-1.1.3.1</strong></p>

<ul>
	<li>Starting this release, MLNX EN+RoCE&nbsp;drivers will adopt the following versioning naming scheme: YY.MM-x.x.x.x (i.e., Year.Month-x.x.x.x).</li>
	<li>Added support for allowing the host to track various statistics for the VFs, specifically all of the Q_counters stats even if he gives the VF to a VM, through the representor Q_counters for the VF which are now exposed over the host.</li>
	<li>With this feature, a kernel error log is now generated when certain fatal QP errors occur.</li>
	<li>Added support for the following operating systems:
	<ul>
		<li>RHEL 9.2</li>
		<li>RHEL 8.8</li>
		<li>SLES15-SP5</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 23.04-1.1.3.1:</strong></p>

<ul>
	<li>Installing &quot;mlnx_tune&quot; on Python3 did not work properly. &quot;mlnx_tune&quot; now supports Python3 in addition to Python2.</li>
	<li>Changing traffic class via the sysfs while modifying QPs in parallel caused a deadlock.</li>
	<li>Due to a bug in the emulation layer, performance degradation was experienced when running GPUDirect over Virtual Functions.</li>
	<li>&quot;debugfs&quot; directories could not be created for representors and sub-functions, thus the log showed error for both the scenarios.</li>
	<li>&quot;knem&quot; did not fully support RHEL8.7 and newer releases.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="118ba074c4b3495fbd26210e14a17511" version="9a4059f5b0de4ec286185e08bcb4b609" lucid_version="U40.fwpkg@3.10_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e3c28d7e84d2418a888d50f48b760538" version="66105ed122a44605bdd9fd55c793f9a7" lucid_version="MB2000JFEML_MB4000JFEMN_x64@HPD6(K)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ddc8bdca3abc4ab8823e820be1ed4dfd" version="1ad6efad9fac4667aea213b4a43f022b" lucid_version="smartpqi.sles15.x86_64.rpm@2.1.26-030__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.1.26-030" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>SR 2.8.2/SR 3.3.2 Drop1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.1.24-046" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a1b0fb5619dd4bf685499171488aaaa2" version="46ae280b1e1146b6ba9004d241c7b7f2" lucid_version="MB018000GXMTK_MB020000GXMTQ_ESXi@HPG2__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Update maximum continuous operation temperature values for host thermal management and reporting.</li>
	<li>Assert fixes, logging enhancements and all current firmware improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e33bb1d2f7324af98ab1d5f7897ec4b5" version="28a1fa7c9cc74625a0ef9a506f324fc8" lucid_version="mlnxcx4.w2k22@23.10.26252.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="23.10.26252.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="23.4.26054.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the ports&#39; number information in the Device Manager. Now the Information Pane of Properties of NIC adapter displays information of more than 2 ports.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f1e3dc0362445eba42c38fd34e5d638" version="659fb4caf150456590087e06822edc68" lucid_version="MM1000JEFRB_MM2000JEFRC_ESXi@HPDA(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDA (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="83f19a40734047f1a91d25f9cd465999" version="3639b6c7a06749518e098b668dc996bb" lucid_version="nicfwupg_bcm_open.vmware@1.37.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.37.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports GetPackageStatus NCSI Command.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.36.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed abnormal fan behavior when BCM5719 OCP3 installed.</li>
	<li>This product addressed the failure of IP dispatch when using BCM5719 LOM as shared iLO networking.</li>
	<li>This product addressed that platform might encounter a POST failure when NX1-based controllers and some storage controllers combines.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7fe88b20c8c948e29d704473f3133fee" version="f11dcd7a12814574bf81ba69b7592223" lucid_version="U50.Fwpkg@2.00_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.<br />
This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel&#39;s mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.&nbsp; This issue is not unique to HPE servers.<br />
Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.<br />
Addressed an issue where NVME hot plug when installing fully loaded NVME drives.<br />
Addressed a potential security vulnerability in some 3rd and 4th Generation Intel&reg; Xeon&reg; Processors when using Intel&reg; Software Guard Extensions (SGX) or Intel&reg; Trust Domain Extensions (TDX) may allow escalation of privilege, as documented in CVE-2023-22655.<br />
Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.<br />
Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.<br />
Addressed an issue where the iSCSI SW ipv6 HDD could not be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address Type.<br />
Addressed an issue where setup options of the BIOS Configuration (RBSU) utility may not be synchronized to the latest state when a server is idle in RBSU for more than 30 minutes.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.</p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.</p><p>Addressed an issue where NVME hot plug when installing fully loaded NVME drives.</p><p>Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.</p><p>Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.</p><p>Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt > select Network device > IP Address Type.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b24f5415c77d43548ef3f4466312e507" version="283131a74eca4692ad0a21456d8916bf" lucid_version="MB014000JWTFD_MB012000JWTFC_x64@HPD8(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="205e86b4ae1e4a28ae1e3cf39faf17ba" version="7c87c3306d29488ca45f22b6a95c5bf6" lucid_version="MB004000GWWQH_MB002000GWWQF_MB001000GWWQE_x64@HPG6(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Update maximum continuous operation temperature values for host thermal management and reporting.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="39676e9bd8d74e11b8837e3f6ebabd5c" version="5a08ffab2c5447e9b718a179a54a0425" lucid_version="ssa.linux.x64@6.30.8.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="6.30.8.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>For 2024 March MSB</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.25.9.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b81956d2c370432aad5ffc0ea6fc40b3" version="01f5aa326c5c488f861d288fdf4bbfd4" lucid_version="PICGen10.win.x64@1.1.4__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.1.4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>For HPE ProLiant Gen10 Plus servers, iLO5 version 2.55 or above is required to upgrade to this version.</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>Changed certain behaviors to avoid machine power failures when significant power consumption devices are introduced.</p>

<p><strong>Problems Fixed:</strong></p>

<p>None</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.1.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>For HPE ProLiant Gen10 Plus servers, iLO5 version 2.55 or above is required to upgrade to this version.</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>Changed certain behaviors to avoid machine power failures when significant power consumption devices are introduced.</p>

<p><strong>Problems Fixed:</strong></p>

<p>None</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="261c2f9a8f584fd69c7ae5c1643322e4" version="58867d3617da4d4d9b6a40c9d17b39d1" lucid_version="MK000240GWKVK_MK000480GWJPN_MK000960GWJPP_MK0_ESXi@HPG5(H)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4893b899f6404bf4b119e3e3a55be5b2" version="2a352787ebb447a9a0a20b4d9eaf4e0f" lucid_version="MB012000JWDFD_x64@HPD3(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="809cff8704ac44759685c033bb7b76d3" version="e8e9b93be59145b994c33377a748606e" lucid_version="MB014000JWRTH_MB012000JWRTF_MB010000JWRTE_ESXi@HPD2(H)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0c95f7c054f047b69fbfe7c93264a982" version="a6ec0e2b02324eefb2537f6fb7daed37" lucid_version="MB008000JWJRQ_MB006000JWJRP_x64@HPD9(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="77057f17d85c42018e33e3454cf6ece5" version="bb20f501060f44c28393e4a8671fff07" lucid_version="mlnx_OFED_Driver@23.7.50000.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="23.7.50000.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release of OFED Storage Driver</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed behavior where installation was not complete and &quot;cannot load dll&quot; message was presented during installation.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90.50010.0 (b)" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release of OFED Storage Driver</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed behavior where installation was not complete and &quot;cannot load dll&quot; message was presented during installation.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="994a54e899fb4be5bf05bb0bf86539b6" version="fae68f06ddb14b99883de4bbba578db4" lucid_version="VO001920KWVMT_VO003840KWVMU_VO007680KWVMV_ESXi@HPK3(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d09d3bc174174ab69b229c1370a5ce48" version="e20d7143a0eb46c790f651e80dec4e61" lucid_version="EG000300JWSJP_EG000600JWJNH_EG001200JWJNK_x64@HPD5(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Sever 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware mitigates a potential reliability concern.</li>
	<li>The firmware applied the new seek recovery mechanism to improve the level-down condition and highly reduce the media errors from occurring.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0621549b347544c1869a7fcad2fb7ecf" version="ed610f2a267f493cb5fa667fb76d8159" lucid_version="MO000400JWFWN_MO000800JWFWP_MO001600JWFWQ_x64@HPD5(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="38d3787c49804ab1b404f61b3cd58354" version="817159be8ce742cf85117f4635c3a007" lucid_version="VO000800JWZJP_VO001600JWZJQ_VO003200JWZJR_x64@HPD5-rev1__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00136659en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="001e7fbaf67f420ebcb746aae6b4aee2" version="93b51d241c9645e49cd22354bae5572f" lucid_version="VO000800JWZJP_VO001600JWZJQ_VO003200JWZJR_ESXi@HPD5-rev2__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00136659en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b8bfd68496a643cdaece510776fb4ad2" version="53e58d31825246148c300ec71c88ac08" lucid_version="broadcom_nxe.w2k22@228.0.121.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="228.0.121.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.0.125.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed the problem that RoCE driver failed to load with specific active firmware version.</li>
	<li>This product addressed private data retrieval for user mode RDMA connectors.</li>
	<li>This product addressed a fix for NDSPI to correctly detect the type of retransmit capability.</li>
	<li>This product addressed correct NDIS version of file details of the Server2022 build.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4a7391c65f0b46d485ea7105b1cfb339" version="a7a921ce3d8f40f9821474b617c2a54e" lucid_version="A47.linux@3.00_01-26-2024(B)__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:
/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 3.00_01-26-2024.</p>

<p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors. This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors. This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers. This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575. This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers. This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575. This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_01-26-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:
/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.
This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.
This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="066920f0b4684f1da260602d0174d2e0" version="5fb18a2a0f394d99aff3642b4051147f" lucid_version="nicfwpkg_qlflq@8.65.09(B)__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="8.65.09" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses the issue of inconsistent metadata within the component products.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.65.09" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where BSOD is seen.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="39fa471cea234b3883e794de990ad252" version="4d62e2e9bc9841bab3199f48fb5a1f2a" lucid_version="MB001000GWCBC_MB002000GWCBD_x64@HPG6(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="29a000381a7c4ec8a72063a155821a0a" version="73b5e861ca8d4cfaaa0ba05b0cd85788" lucid_version="ice.sles15@1.12.6-1(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.12.6-1" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports linux command to split port.</li>
	<li>This product now supports MSI-X vector allocation tuning by sysfs.</li>
	<li>This product now supports limiting the Maximum Bitrate for a Transmit Queue.</li>
	<li>This product now supports generic binary RPM starting from SUSE Linux Enterprise Server 15 SP5.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue where the Linux FW update results in system hangs.</li>
	<li>This product correct an issue where when using certain DDP package versions, 802.1ad type VLANs might not be correctly enabled on SIOV or SR-IOV interfaces.</li>
	<li>This product correct a ptp4l kernel crash and several ptp related issues.</li>
	<li>This product correct an issue where the ice driver fails to remove the GNSS module properly on driver unload, resulting in a kernel panic.</li>
	<li>This product correct an issue where running traffic via Open vSwitch.</li>
	<li>This product correct an issue where a performance issue caused the GNSS write commands to be delayed and not delivered until the next commands appeared.</li>
	<li>This product correct an issue for Linux ice driver v1.7.16+ on E810 four-port devices where VF could not be created on certain high-core count platform.</li>
	<li>This product correct an issue where unloading a driver without a DDP profile would disable PF interfaces.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.6-1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports linux command to split port.</li>
	<li>This product now supports MSI-X vector allocation tuning by sysfs.</li>
	<li>This product now supports limiting the Maximum Bitrate for a Transmit Queue.</li>
	<li>This product now supports generic binary RPM starting from SUSE Linux Enterprise Server 15 SP5.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue where the Linux FW update results in system hangs.</li>
	<li>This product correct an issue where when using certain DDP package versions, 802.1ad type VLANs might not be correctly enabled on SIOV or SR-IOV interfaces.</li>
	<li>This product correct a ptp4l kernel crash and several ptp related issues.</li>
	<li>This product correct an issue where the ice driver fails to remove the GNSS module properly on driver unload, resulting in a kernel panic.</li>
	<li>This product correct an issue where running traffic via Open vSwitch.</li>
	<li>This product correct an issue where a performance issue caused the GNSS write commands to be delayed and not delivered until the next commands appeared.</li>
	<li>This product correct an issue for Linux ice driver v1.7.16+ on E810 four-port devices where VF could not be created on certain high-core count platform.</li>
	<li>This product correct an issue where unloading a driver without a DDP profile would disable PF interfaces.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fa3afb08b69b4eb3ac32d9088c68d3a9" version="8939e8c6779a48fe8c70a81173a5593d" lucid_version="MB010000JWZHA_MB012000JWZHB_MB014000JWZHC_x64@HPD4(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>High Security Enablement support FIPs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Addresses a hot plug reporting concern</li>
	<li>Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ce7e63b5ed004965a0bc6af06ca584ef" version="cf4966110ac4455a8a7aa156def392c6" lucid_version="D6020.fwsc.linux_x64@2.74(O)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="2.74" revision="O" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of RHEL 8.7</p>
	</li>
	<li>
	<p>Added support ofRHEL 9.1&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP4</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v234598/20-D6020-Gen10RN274N_ED12.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.74 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of Rhel 7.8&nbsp;</p>
	</li>
	<li>
	<p>Added support of Rhel 8.2&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP2</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v202690/20-D6020-Gen10RN274J_ED8.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e774fea9b642407a9f2687df296d352e" version="404cafa4b59849489f8aabd37f096534" lucid_version="iavf.w2k19@1.14.201.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.14.201.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.13.8.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation library iavfmsg.dll.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1d14b3fb06db4e8a9306176914f7f80d" version="67a68bec1ad146edac29dd1e3adec412" lucid_version="VO000960KWUEA_VO001920KWUEB_VO003840KWUEC_x64@HPK2(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This component provides support only for VMD enabled Intel VROC platform</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c91a34b258694c1696514c7b51041b33" version="3975f37d85774c6bb372887b2c13b334" lucid_version="a48.fwpkg@3.00_01-26-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:
/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.
This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.
This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.80_07-31-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new System Configuration (RBSU) configuration options that allow enabling L1 IO Drop Chain Enable to drop chain write support to avoid unexpected timeouts due to under certain conditions, some high-bandwidth PCIe devices could fail to complete the transaction.</p><p>In System Configuration (RBSU), the option is located under L1 IO Drop Chain Enable in Service Option when the system is with AMD 3rd Generation EPYC processors.
This setting has the following Redfish properties.
/redfish/v1/systems/1/bios/oem/hpe/service/settings/DropChainedWrite</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for AMD 2nd Generation EPYC processors. 

This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision provides AMD's mitigation for security vulnerabilities for CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.1.1u update which provides mitigation for security vulnerabilities documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.</p><p>Addressed an issue where Secure Boot would not be enabled when loading manufacturing default from iLO web.</p><p>Addressed an issue where RSOD would occur when entering "System Information" from RBSU under legacy mode.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fc28c0050f9d4a8a94e83f990b230b39" version="1281d68586c7461b8c537cc456f3c4fe" lucid_version="VS000480KXALB_VS001920KWXFP_VS000960KWXFN@85032G00(C)__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="85032G00" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="85032G00 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e94dfd89626f4fc992d59a1c00e08f54" version="6393235f3da34c60ba550f33b4967e1b" lucid_version="MB006000GWJRR_MB008000GWJRT_x64@HPG6(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer -&nbsp;Improve random mix performance in TL=2048k and 512k</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer -&nbsp;Improve random mix performance in TL=2048k and 512k</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c19eee3c7a1046a4aeaff35e462fce56" version="92dc449471864a84a17d488e193e8bac" lucid_version="MM2000GEFRA_ESXi@HPG9(B)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG9" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG9 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e6ce1a91bd5b4f829c98f53210189206" version="3336b5361ea442cda585bde0277fcc49" lucid_version="MB012000GWTFE_MB014000GWTFF_ESXi@HPG8-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for potential hangs and timeouts, tuning fixes based on field experience and maintenance logging items</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for potential hangs and timeouts, tuning fixes based on field experience and maintenance logging items</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cf7cb50c769b4b00ab89aa81d9fac797" version="1c74e7a216a84aaaa2469a83afc0d570" lucid_version="VO000960RWUEV_VO001920RWUFA_VO003840RWUFB_ESXi@HPD8__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for unrecovered errors which may occur on the targeted Blocks of Wear-leveling process when host issues Read command.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 6.7</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d473378e1f2847f48383c6be4c105511" version="704eea13878e46e5a22c95096d240f5f" lucid_version="isut-esxi.esxi80@2024.03.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the <a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes</a> for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2024.01.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the <a href="https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25">iSUT Release Notes</a> for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fde211973c7e4009ac1207f980953529" version="8e302b6e0f1d4a7e881568cd787c539f" lucid_version="VK000480GWTHA_VK000960GWTHB_VK001920GWTHC_x64@HPG4(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed an issue to Allow Drives to update Firmware even though the Drive is in Predictive Failure Condition</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f433cea5bd0849d286e6c1b1e45a60d4" version="f4d369e063b54d4390cee8ae4d57b077" lucid_version="MB6000JVYZD_MB4000JVYZC_x64@HPD4(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9adece559a5e4fcf8de67cd47aa7d7c7" version="5cb44e74400a41229e84169581262178" lucid_version="FWPKG_VO000960PZWSL_VO001920PZWSN@HPD3-rev1__fwpkg-drive_en"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>It has fix code for V6 Read disturb issue and other issue.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00136659en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>It has fix code for V6 Read disturb issue and other issue</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d06d054af702418fa905eb8595ceb958" version="74ebd8fc75814239947eaf9cc11340dd" lucid_version="MK000400KWDUK_VK000480KWDUE_MK000800KWDUL_VK00_x64@HPK4(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3f367d314e5844f2951b656b04957c6e" version="2ccca73921fd4ec2a0c3873cce566e14" lucid_version="net-mst.vmware70@2023.09.20__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.09.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>NMST version 4.25.0.703</p>

<p>&nbsp;</p>

<p>This version is supported on VMware ESXi 7.0 Update 3&nbsp;only.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.08.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes have been made&nbsp;in version 2023.08.01:</strong></p>

<ul>
	<li>Added support to ESXi&nbsp;8.0.</li>
</ul>

<p>&nbsp;</p>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d952c2a30d6f4bb29ccf7ec141400337" version="38775a1cebe94c7888ce3237a508d1c3" lucid_version="smartpqi.rhel8_x86_64.rpm@2.1.26-030__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.1.26-030" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>SR 2.8.2/SR 3.3.2 Drop1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.1.24-046" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5d8c4ca5e9ce4b8ab296e754f4544502" version="e4691210f90d4222a5c2d42db9c67187" lucid_version="MB002000JYDNE_MB004000JYDPB_x64@HPD2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022,</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="de51682518bb48a2bb985003f8a8df4e" version="a18dd32ff9624f64a413dd6e7c8ef22a" lucid_version="D3000B.fwsc.linux_x64@6.00(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="6.00" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of Rhel 8.7&nbsp;</p>
	</li>
	<li>
	<p>Added support of Rhel 9.1&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP4</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>Code optimization to save memory repo.</p>
	</li>
	<li>
	<p>TLB exception seen while doing esp reset when expander reset was in progress.</p>
	</li>
	<li>
	<p>Added the psoc 8.93 binary in peripheral images, updated the reveille version numbers.</p>
	</li>
	<li>
	<p>Added whole new Delta PS-pmbus code , Updated the ESP version number.</p>
	</li>
</ul>

<p>Please refer to the<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1808229885/v234599/20-D3000B-Gen10RN600A_ED2.html">&nbsp;<u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d33174a587ab4b3ea4d5e4e22de786d1" version="45f80e1e012044968ee74abdff16935e" lucid_version="MB006000GWKGR_x64@HPG1(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="169b01f1c4c245bc854a8424af9a5f85" version="157ccc31320847b583b95319bb0b3380" lucid_version="U31.win.x64@3.10_02-22-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3f2f70c223354bc6b59b77123faa8545" version="f443f94d04814d299a1911df001ce11c" lucid_version="EH000900JWCPN_EH000600JWCPL_EH000300JWCPK_x64@HPDA__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize sensor reporting to improve failure rate - AFR metrics</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3d004333c656491289fdf09d5881fcdd" version="27dd51bad3eb4cc89d885484a55eb194" lucid_version="MK000800KWWFE_MK001600KWWFF_MK003200KWWFH_x64@HPK3(K)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>
	<p>This component provides support only for VMD enabled Intel VROC platform</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d6464fc039cd4a77b22febd8762dca03" version="d932ae19401a424bad3804fff044c409" lucid_version="coffeelake.win.x64@10.1.18807.8279(C)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.1.18807.8279" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.1.18807.8279 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added SHA384 signature</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ff242e39c275472185612592300114ce" version="0ca64713961f4be0a65eb9f69b6e50d8" lucid_version="qevbd.win64@8.72.11.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="8.72.11.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which fixed an issue that VMs lose connectivity and system freezes with Windows Azure HCI.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.72.1.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of combo image version v8.65.09.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="865064fe88324b7ea65c940d300f10de" version="89568bbb05734664b12fdedbfa7fd3e7" lucid_version="MB018000JXMTH_MB020000JXMTP_ESXi@HPD2__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Assert fixes, logging enhancements and all current firmware improvements and bug fixes.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ab6756bde612475998d62d4bbb8717ff" version="672e48e7806b48c09f76dbcfb80fdea5" lucid_version="VO001920KYDMT_VO003840KYDMV_MO001600KYDMU_x64@HPK5__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Prioritize disabling Non-Fatal Error reporting at the beginning of FLR processing</li>
	<li>Fix known FW bug PI/CI indexing issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix bugs found in the previous version and improve on TTR (Time To Ready) requirement to fix device temporarily not found issue after hot-plug.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c33dcf4fcf5847ada8c87d0479b6cb3a" version="69470c96d9fb40a5a80c6d4259ccbfbe" lucid_version="MB1000GVYZE_MB2000GVYZF_MB3000GVYZH_ESXi@HPG5(B)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="C9113" version="597902f2165f46f1826adeef02096f3f" lucid_version="hponcfg.w2k3_64@6.0.0.0-rev1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="6.0.0.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Introduced support for iLO 6.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.0.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Introduced support for iLO 6.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f77f9ef4381482fb9f00a79ce325ab3" version="25d41a3736ea45d0a14bdfa1d6b2520d" lucid_version="a40.fwpkg@3.00_01-26-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM contains updates aligned with vulnerability fixes in EDK2 NetworkPkg IP stack implementation that is described in the address https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.



This revision of the System ROM includes AMD reference code NaplesPI 1.0.0.K for AMD 1st Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6114e7f77ac240e69cf280b518ec5e27" version="350e2bd1d1884a9c90a2dbe48ecad602" lucid_version="MB001000GWFWK_MB002000GWFWL_x64@HPG6(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0d61f1ea72cf4d4991d4093a05f8808a" version="d44f64e666a443bbaba87653bfd8cdef" lucid_version="MT001600KWHAC_MT003200KWHAD_MT006400KWHAE_x64@HPK2(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e4dd84a160cc43f1b620391e92c1a737" version="2b84ea52c58a4855ae4b9cfc5479d37d" lucid_version="KCM6FRUL1T92_KCM6FRUL3T84_KCM6FVUL1T60_x64@GPK5(B)__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="GPK5" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="GPK4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>
	<p>This component provides support only for VMD enabled Intel VROC platform</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="60d0acd98b544d0bac0a673d97d9bb2d" version="1586b5f64e73422283c419e0da7720cc" lucid_version="emulex_windows_smartsan_enablement.w2k22.x64@1.0.0.1(f)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.0.1" revision="f" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.1 (e)" revision="e" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="99c23ff7c8d6427fabec401028b615d8" version="8fe6218ae3184c0bb66dcc79f7eb3ace" lucid_version="MZPLJ1T6HBJR-000H3_MZPLJ3T2HBJR-000H3_MZPLJ6T_x64@EPK76H3Q(D)__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="EPK76H3Q" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="EPK76H3Q (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="972a94402aa14188aa7633893c7137b6" version="9cf9084eab2443209cdde9150bd4969f" lucid_version="U33.fwpkg@3.10_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="23c569ea92fb47f091a7a0c891acff72" version="ec8b88dd91c248c3a1b50f52657ec150" lucid_version="FWPKG-P25960-B21@22.39.1002__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="22.39.1002" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p><strong>New features and changes included in version 22.39.1002:</strong></p>

<ul>
	<li>Modified the TCP IPv4 flows so that the steering TIR rx_hash_symmetric field is now valid only when both the SRC and DST fields are not set to zero.</li>
	<li>Added a locking mechanism to protect the firmware from a race condition between insertion and deletion of the same rule in parallel. Such behavior occasionally resulted in firmware accessing a memory that has already been released, thus causing IOMMU / translation error.</li>
</ul>

<p style="margin-left:40px">Note: This change will not impact insertion rate for tables owned by SW steering.</p>

<ul>
	<li>Enabled live migration for virtio with mergeable buffer.</li>
	<li>Added a caching mechanism to improved expansion ROM performance and to avoid any slow boot occurrences when loading the expansion ROM driver.</li>
	<li>Added support for image size above 4GB when performing a live migration by splitting the image to chunks.</li>
	<li>Extended the role-based authentication to cover all crypto algorithms. Now the TLS. IPsec. MACsec. GCM, mem2mem, and NISP work when nv_crypto_conf.crypto_policy = CRYPTO_POLICY_FIPS_LEVEL_2, meaning all cryptographic engines can also work in wrapped mode and not only in plaintext mode.</li>
	<li>Programmable Congestion Control is now the default CC mechanism. ZTR_RTTCC is the default CC algorithm when ECE is enabled and the CC algorithm negotiation succeeds, otherwise PCC DCQCN will be used.</li>
	<li>Added new support for reserved mkey index range. When enabled, a range of mkey indexes is reserved for mkey by name use.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 22.39.1002:</strong></p>

<ul>
	<li>Migration data corruption occurred when running parallel save_vhca_state/load_vhca_state commands on the same PF.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="22.37.1700" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New features and changes included in version 22.37.1700:</strong></p>

<ul>
	<li>Added a safety mechanism to prevent the link from to getting stuck when receiving bad tuning results. In this case, the linkup flow is restarted and the mechanism retries to raise the link.</li>
	<li>Improved rate limit token re-distribution algorithm.</li>
	<li>Improved non-consumed bandwidth re-distribution.</li>
	<li>Added mergeable buffer support (VIRTIO_NET_F_MRG_RXBUF in virtio spec) for VDPA kernel mode to improve performance in case of large MTU such as 9K. The feature is disabled by default and must be manually enabled while creating or modifying the virtio device.</li>
</ul>

<p style="margin-left:40px">&nbsp;&nbsp; &nbsp;Note: For best performance, it is NOT recommended to enable the feature if the VDPA MTU is set to the default value (1500).</p>

<ul>
	<li>A new capability that enables the VM to track and limit its Vport&#39;s activity. This is done using the new q_counters counter which enables aggregation of other Vport&#39;s from PF GVMI.</li>
	<li>Added a flow rule that enables offloading of multicast traffic by broadcasting it to multi-Flow-Table in FDB.</li>
	<li>Enables a smooth and statically switch between PCC algorithms. In addition, the user can now switch between PCC algorithms while running traffic.</li>
	<li>Added support for running PCC firmware trace without saving and sending the DB strings to the tool with the following changes:
	<ul>
		<li>Added new string section to the user PCC image creation tool</li>
		<li>Added the new PCC DB strings to MTRC access registers output</li>
		<li>On the tool&#39;s part: added support to reading the string.db using the MTRC access registers</li>
	</ul>
	</li>
	<li>Added support for 32 actions in the header modify pattern using bulk allocation.</li>
	<li>The software can explicitly set the SL of an RTT response packet, instead of it being taken from the RTT request packet&#39;s SL. The RTT response packet SL may be set/queried via the CONGESTION_CONTROL_HCA_NP_PARAMETER MAD.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 22.37.1700:</strong></p>

<ul>
	<li>No ping in NODNIC VF when VLAN stripping was enabled.</li>
	<li>vDPA application initialization failed due to virtual queue creation failure. The failure came with the &quot;0x8f7a: ring address translate failed&quot; assert which indicates incorrect permission supplied by QEMU for virtual ring memory.</li>
	<li>CNP received, handled, and ignored counters in the hardware counters could not work after moving to Programmable Congestion Control mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ccd2fccdbff94b0ab75d085d46522784" version="4008d84d30cb4848bc93adc213dab8cc" lucid_version="emulex.fc.fw.lin.x64_rt@2023.10.01(c)__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.01" revision="c" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This component is FIPs enabled.</p>

<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.19</td>
			<td>14.2.589.19</td>
			<td>14.2.589.16</td>
			<td>14.2.566.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.19</td>
			<td>14.2.589.19</td>
			<td>14.2.589.16</td>
			<td>14.2.566.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This component is FIPs enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.10.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.19</td>
			<td>14.2.589.19</td>
			<td>14.2.589.16</td>
			<td>14.2.566.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.19</td>
			<td>14.2.589.19</td>
			<td>14.2.589.16</td>
			<td>14.2.566.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6b2dbf58581246349103e902007d06c0" version="93c15581edb54c258223f56268023084" lucid_version="MB018000GXMTK_MB020000GXMTQ_x64@HPG2__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Update maximum continuous operation temperature values for host thermal management and reporting.</li>
	<li>Assert fixes, logging enhancements and all current firmware improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9141b4ee76c74b70a4eb2f021bfa217f" version="ee69641caab84068909faac88413095f" lucid_version="VO000960JWTBK_VO001920JWTBL_VO003840JWTBN_x64@HPDB__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for unrecovered errors which may occur on the targeted Blocks of Wear-leveling process when host issues Read command.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5413adceb7d241de900274e399d9c777" version="e4d9e4580033442d80084ef17c9bd977" lucid_version="intel_pvl.w2k19@12.18.16.0-rev1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.18.16.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which fixes the device will be disabled and event ID 10400 after iPerf test.</li>
	<li>This product correct an issue which fixes link flapping while performing network traffic on the links of the network adapter.</li>
	<li>This product correct an issue which fixes unexpected transmission stop.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.18.16.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which fixes the device will be disabled and event ID 10400 after iPerf test.</li>
	<li>This product correct an issue which fixes link flapping while performing network traffic on the links of the network adapter.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c39569bc587a4f349da8acb8c9f56575" version="f0251128e53f4856a10a83f77c6aafc6" lucid_version="mlnx_en_roce_mlx5.rhel9u2.x86_64.rpm@23.10-1.1.9.1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="23.10-1.1.9.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>No changes or new features included in version 23.10-1.1.9.1.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 23.10-1.1.9.1:</strong></p>

<ul>
	<li>An error was triggered in case devlink reload was attempted when there were allocated subfunctions.</li>
	<li>Changing the steering mode to firmware steering was unsupported for policy IPsec rules.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="23.04-1.1.3.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following&nbsp;changes and new features have been included in version 23.04-1.1.3.1</strong></p>

<ul>
	<li>Starting this release, MLNX EN+RoCE&nbsp;drivers will adopt the following versioning naming scheme: YY.MM-x.x.x.x (i.e., Year.Month-x.x.x.x).</li>
	<li>Added support for allowing the host to track various statistics for the VFs, specifically all of the Q_counters stats even if he gives the VF to a VM, through the representor Q_counters for the VF which are now exposed over the host.</li>
	<li>With this feature, a kernel error log is now generated when certain fatal QP errors occur.</li>
	<li>Added support for the following operating systems:
	<ul>
		<li>RHEL 9.2</li>
		<li>RHEL 8.8</li>
		<li>SLES15-SP5</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 23.04-1.1.3.1:</strong></p>

<ul>
	<li>Installing &quot;mlnx_tune&quot; on Python3 did not work properly. &quot;mlnx_tune&quot; now supports Python3 in addition to Python2.</li>
	<li>Changing traffic class via the sysfs while modifying QPs in parallel caused a deadlock.</li>
	<li>Due to a bug in the emulation layer, performance degradation was experienced when running GPUDirect over Virtual Functions.</li>
	<li>&quot;debugfs&quot; directories could not be created for representors and sub-functions, thus the log showed error for both the scenarios.</li>
	<li>&quot;knem&quot; did not fully support RHEL8.7 and newer releases.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="78667359eec84fc9af9066672db940e0" version="c3b5e0bb7d834e5684dba07537706d2e" lucid_version="SPSGen10Plus.Linux@04.04.04.603__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="04.04.04.603" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This version is in compliance with IPU.2024.1 guidance.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/22/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2023-35191. This issue is not unique to HPE servers.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="04.04.04.500" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2023.3 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d2d1d9a632e643969f5a1799b83f981a" version="719d34c682a14e53a64f82195175cf69" lucid_version="MR000240GWFLU_MR000480GWFLV_VR000480GWFMD_MR0_ESXi@HPGG(D)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGG" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGG (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8f93dddcb15744aab6bb426d5e84dee8" version="0926326250b04983bac5352282fa3cf7" lucid_version="VK000480GZCNE_VK000960GZCNF_VK001920GZCNH_x64@HPG3(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improve the FW about data mismatch after SPL</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a6c377914cad4568810f0a24fc0faa52" version="e28f3e4e56b14ef1bd0767e276d272c3" lucid_version="MK000480GWXFF_MK000960GWXFH_MK001920GWXFK_ESXi@HPG3-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improve the FW about data mismatch after SPL issued.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improve the FW about data mismatch after SPL issued.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4a88cfeb4a984c96a13ab1090bcaab71" version="fff75bd31f054207834227c390d29806" lucid_version="MLNX_Ethernet_Only_NIC_FW_package.esxi70@1.0.7__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 2.42.5044 :</strong></p>

<ul>
	<li>779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)</li>
	<li>779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</li>
	<li>817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following device has been&nbsp;updated to 16.35.3006:</strong></p>

<ul>
	<li>874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 2.42.5044 :</strong></p>

<ul>
	<li>779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)</li>
	<li>779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</li>
	<li>817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following device has been&nbsp;updated to 16.35.1012:</strong></p>

<ul>
	<li>874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</p>

<p><strong>New features and changes included in version 16.35.1012:</strong></p>

<ul>
	<li>Added support for copy modify header steering action to/from the UDP field.</li>
	<li>Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.</li>
	<li>QoS priority trust default state can now be changed using the new nvconfig below:
	<ul>
		<li>QOS_TRUST_STATE_P1</li>
		<li>QOS_TRUST_STATE_P2</li>
	</ul>
	</li>
</ul>

<p style="margin-left:40px">The values that can be used to set the default state are:</p>

<ul style="margin-left:40px">
	<li>TRUST_PORT</li>
	<li>TRUST_PCP</li>
	<li>TRUST_DSCP</li>
	<li>TRUST_DSCP_PCP</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>

<p>&nbsp;</p>

<p><strong>The following issues have been fixed in version 16.35.1012:</strong></p>

<ul>
	<li>RDE (Redfish) PATCH operation to LLDPTransmit properties &quot;ManagementAddressIPv4&quot;, &quot;ManagementAddressIPv6&quot; and &quot;ManagementAddressMAC&quot; were applied only in the first attempt, but failed in the next.</li>
	<li>PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.</li>
	<li>Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions.&nbsp;</li>
	<li>InfiniBand L2 QP could not receive RDMA traffic occasionally.</li>
	<li>Running with a debug firmware reduced security as if token was applied.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="74085bfad3ea4badb1e5c0235f47c1ea" version="2f9365d190c34c128edc569b230fdb05" lucid_version="EO000400PXDBQ_EO000800PXDCK_EO001600PXDCH_x64@HPD3(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8bcfdc333663490ba14bb0a7e2286062" version="ef62264bb6d149e8a4dc4a01ea0ed41a" lucid_version="D6020.fwsc.esxi@2.74(O)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="2.74" revision="O" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support of ESXi 8.0 U1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v234598/20-D6020-Gen10RN274N_ED12.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.74 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v202690/20-D6020-Gen10RN274J_ED8.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="03a1d5d1c9c84f2b9c715674a729ac00" version="7c6c80ff21e84174bb2d7b5920467418" lucid_version="MB012000GWTFE_MB014000GWTFF_x64@HPG8(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for potential hangs and timeouts, tuning fixes based on field experience and maintenance logging items</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ccbfcdbdc47644e7ab18a371d4af9d7a" version="9b2c5bf3147b46d09302300cf40d62bd" lucid_version="U38.win.x64@3.10_02-22-2024-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4a440c014d52404fb26a46463eb5e62b" version="f896d65fc1c34125b7710832d514b4a5" lucid_version="SmartDQ2.win@106.124.100.1005-rev1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="106.124.100.1005" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added UBM6 backplane support.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="106.124.100.1005" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added UBM6 backplane support.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b02d63095f7c44f5ba3d7deb6bb4021a" version="0f7bfe01ad024affa160b069a0e22476" lucid_version="MB8000JFECQ_ESXi@HPD7(J)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (J)" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f97eb4848b18499fa1a1379ab7b46d05" version="60d22442837b4b8fbc49b58a68c33321" lucid_version="esxi70-fc-enablement-sw-bundle-sc@2022.09.01-rev1__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2022.09.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Supports VMware ESXi 7.0 U2 and ESXi 7.0 U3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2022.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Supports VMware ESXi 7.0 U2 and ESXi 7.0 U3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c101b138be5d4ee79271a6725d6813d4" version="21b689e39d4144a9a051d9a392c70724" lucid_version="KCM6XVUL800G_KCM6XVUL1T60_KCM6XVUL3T20@GPK7__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="GPK7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for BSOD issue due to SRIS misdetection and FW Commit command via PCIe VDM (MCTP OVER PCIe) timed out.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="GPK6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="75d8486987f7480b8e2a0459e1d59d0e" version="4fd3aabbc92e4ada9b2455e88784e44e" lucid_version="MB010000GYDKP_MB012000GYCJL_MB014000GYCJT_x64@HPG2__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Update maximum continuous operation temperature values for host thermal management and reporting.</li>
	<li>Assert fixes, logging enhancements and all current firmware improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Sever 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b0391b3a14de43ee99f90e7fe9de4040" version="8742741a60744094896021479f077ace" lucid_version="U56.Fwpkg@2.00_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.<br />
This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel&#39;s mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.&nbsp; This issue is not unique to HPE servers.<br />
Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.<br />
Addressed an issue where NVME hot plug when installing fully loaded NVME drives.<br />
Addressed a potential security vulnerability in some 3rd and 4th Generation Intel&reg; Xeon&reg; Processors when using Intel&reg; Software Guard Extensions (SGX) or Intel&reg; Trust Domain Extensions (TDX) may allow escalation of privilege, as documented in CVE-2023-22655.<br />
Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.<br />
Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.<br />
Addressed an issue where the iSCSI SW ipv6 HDD could not be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address Type.<br />
Addressed an issue where setup options of the BIOS Configuration (RBSU) utility may not be synchronized to the latest state when a server is idle in RBSU for more than 30 minutes.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.</p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.</p><p>Addressed an issue where NVME hot plug when installing fully loaded NVME drives.</p><p>Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.</p><p>Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.</p><p>Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt > select Network device > IP Address Type.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="87377d68a07b4380be825b612d17611d" version="3a3030aa064c4fa3bdd90c163e1d255f" lucid_version="Gen10P_Gen11_MR_Controller.esxi7.0_bundle@2023.12.01-rev1__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.12.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>New release for version 7.726.02.00.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.12.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>New release for version 7.726.02.00.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dc41774861a945f28d388059e656b2ca" version="c3ecd4b72b0643e8abbb22f5261eb33c" lucid_version="nicfwpkg_intel_e810_cq2ocp@4.30__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="4.30" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp; ResetToDefault property(RDE Port Schema).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where InterfaceEnabled property is read only and it can&#39;t patch this property</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="25afa565c5cd4e359629eee44baf7e64" version="c2c818de8f0f41adbf4e632117265d2d" lucid_version="U39.linux@3.10_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d6cef3e7c9484a989ca5a04fc11b29f2" version="560bef5a79204bdea35206bd977b78de" lucid_version="PICGen10.Linux@1.1.4(B)__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.1.4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.1.4(B) contains updates to the firmware packaging and is functionally equivalent to ver. 1.1.4. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 1.1.4.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>For HPE ProLiant Gen10 Plus servers, iLO5 version 2.55 or above is required to upgrade to this version.</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>Changed certain behaviors to avoid machine power failures when significant power consumption devices are introduced.</p>

<p><strong>Problems Fixed:</strong></p>

<p>None</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.1.4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>For HPE ProLiant Gen10 Plus servers, iLO5 version 2.55 or above is required to upgrade to this version.</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>Changed certain behaviors to avoid machine power failures when significant power consumption devices are introduced.</p>

<p><strong>Problems Fixed:</strong></p>

<p>None</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3ac61ed209fd49fb908341fa7b77c3ea" version="1809d5100c2a4fbd897f1c5c77b25fb1" lucid_version="ssaducli.win_x64@6.30.8.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="6.30.8.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>for 2024 March MSB</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.25.9.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1d81dab4bd3149b19db9381601c1abce" version="65882d97b0254de8bf3178f939af5947" lucid_version="nicfwupg_bcm.linux_x64_Gen10@2.36.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="2.36.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports GetPackageStatus NCSI Command.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.35.3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 9.2.</li>
	<li>The product addressed some Broadcom code structure utilization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addressed that platform might encounter a POST failure when NX1-based controllers and some storage controllers combines.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c5274a8d3e3e40d790c226da85bd84aa" version="78cf4890e415411296f46b69f2917bf8" lucid_version="VK000240GWTSV_VK000480GWTTA_VK000960GWTTB_ESXi@HPG7(B)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG7" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG7" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a false indication of rare capacitor test failure</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0d53f18d93f34c14a12850b4c4f5646a" version="12d26ad8eb4a4d7ebce90988eee8ad74" lucid_version="EG000600JWFUV_EG001200JWFVA_x64@HPD4(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for RHEL 9.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d65fb45f0327449eb7763d2d9cb7bf3e" version="59f33df55b0648379af43cca4651c3f8" lucid_version="D8000.fwsc.esxi@0130(C)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="0130" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support of ESXi 8.0 U1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Smart Array reporting &quot;Storage Enclosure FW upgrade Problem Detected&quot;.</li>
	<li>PSU version is showing as &quot;No Ver&quot; after inserted the New bel power PSU.</li>
	<li>GEM_5_2 Coverity defect fix.</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v234513/20-D8000-Gen10RN0130B_ED3.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0130" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Smart Array reporting &quot;Storage Enclosure FW upgrade Problem Detected&quot;.</li>
	<li>PSU version is showing as &quot;No Ver&quot; after inserted the New bel power PSU.</li>
	<li>GEM_5_2 Coverity defect fix.</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v218471/20-D8000-Gen10RN0130_ED1.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a4ccd8709d044858ab5bf64233046176" version="a663f1f50ce245ec806abddbf83cd919" lucid_version="UBM1_FWPKG@1.46(B)-rev1__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="1.46" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial version for UBM FWPKG.</li>
	<li>Support RHEL9 and ESXi8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.46 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial version for UBM FWPKG.</li>
	<li>Support RHEL9 and ESXi8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b27e4086749b43a09022b1ccf9b6e0c0" version="3b787e1f2c7946c1a9b18de99b1d806a" lucid_version="ixgbe.rhel9@5.19.6-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.19.6-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.19.6-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;Red Hat Enterprise Linux 9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="57f299c4757147d2a235078cf35bab3f" version="3e3818b608de41cc9863b95c29cf3254" lucid_version="MB4000JEQNL_MB6000JEQNN_x64@HPDB(L)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDB (K)" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="df57af7543b34ffbb722ca05255bf445" version="8d1f0c6cd15641d18754555d91654846" lucid_version="UBM3_FWPKG@1.24(E)__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="1.24" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>For Gen11 PR3 and 2023 March MSB</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.24 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support Gen11 Intel servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0e268c49682a427da167d2f123ccafaf" version="0b24484130234f3d87d529eb73513855" lucid_version="MB004000JWFVK_MB006000JWFVL_ESXi@HPD4(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ce9f91a90e53444d84d0e7a4367d6fd4" version="0f9d554ba2804443888157bd0eb3944b" lucid_version="icen.vmware80@2023.10.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of CVL4.2.<br />
<br />
&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fix an issue that TCP traffic on VMs might be interrupted if PF undergoes a reset.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f651d51d32bf48dca96b23a2b4fb67f4" version="65327f3f6130452599799a7e22fd32a5" lucid_version="EG001800JWFVC_ESXi@HPD4(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="635ad6621b8d4c52b8b9de3325345e84" version="f156552615d347c79309daa992b39283" lucid_version="qlogic.online.fw.win.x64_rt@2023.10.01__sc-windows-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR">Adapter</p>
			</td>
			<td>
			<p dir="LTR">Speed</p>
			</td>
			<td>
			<p dir="LTR">MBI</p>
			</td>
			<td>
			<p dir="LTR">Firmware</p>
			</td>
			<td>
			<p dir="LTR">UEFI</p>
			</td>
			<td>
			<p dir="LTR">Boot Bios</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.02.05</p>
			</td>
			<td>
			<p dir="LTR">9.14.00</p>
			</td>
			<td>
			<p dir="LTR">7.25</p>
			</td>
			<td>
			<p dir="LTR">3.68</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.09.07</p>
			</td>
			<td>
			<p dir="LTR">09.14.01</p>
			</td>
			<td>
			<p dir="LTR">7.36</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.09.07</p>
			</td>
			<td>
			<p dir="LTR">09.14.01</p>
			</td>
			<td>
			<p dir="LTR">7.36</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.09.07</td>
			<td>09.14.01</td>
			<td>7.36</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.09.07</td>
			<td>09.14.01</td>
			<td>7.36</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following behavior:</p>

<p>Temperature Misreading: the adapter was reading incorrect reading of the temperature on the HPE SN1610Q 32Gb Fibre Channel Host Bus adapter&#39;s Small Form-factor Pluggable. The symptom would result in a temperature spike and potentially reset the system</p>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR">Adapter</p>
			</td>
			<td>
			<p dir="LTR">Speed</p>
			</td>
			<td>
			<p dir="LTR">MBI</p>
			</td>
			<td>
			<p dir="LTR">Firmware</p>
			</td>
			<td>
			<p dir="LTR">UEFI</p>
			</td>
			<td>
			<p dir="LTR">Boot Bios</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.01.03</p>
			</td>
			<td>
			<p dir="LTR">9.12.02</p>
			</td>
			<td>
			<p dir="LTR">7.24</p>
			</td>
			<td>
			<p dir="LTR">3.64</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.08.05</p>
			</td>
			<td>
			<p dir="LTR">09.12.01</p>
			</td>
			<td>
			<p dir="LTR">7.34</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">02.08.05</p>
			</td>
			<td>
			<p dir="LTR">09.12.01</p>
			</td>
			<td>
			<p dir="LTR">7.34</p>
			</td>
			<td>
			<p dir="LTR">0.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.08.05</td>
			<td>09.12.01</td>
			<td>7.34</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>02.08.05</td>
			<td>09.12.01</td>
			<td>7.34</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>

<p>Non-disruptive firmware upgrades: non-disruptive firmware updates is enabled and will not require a server reboot to apply.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following behavior:</p>

<p>Temperature Misreading: the adapter was reading incorrect reading of the temperature on the HPE SN1610Q 32Gb Fibre Channel Host Bus adapter&#39;s Small Form-factor Pluggable. The symptom would result in a temperature spike and potentially reset the system</p>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aedcdb1596004cf4a73ef573a3625e08" version="80fd79f203a84a86bd1285887b54e28b" lucid_version="emulex.fc.fw.esxi80_rt@2023.10.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2023.10.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.21</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.19</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.16</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.19</td>
			<td>14.2.589.19</td>
			<td>14.2.589.16</td>
			<td>14.2.566.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.19</td>
			<td>14.2.589.19</td>
			<td>14.2.589.16</td>
			<td>14.2.566.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td>
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">16Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td>
			<p dir="LTR">32Gb</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.589.5</p>
			</td>
			<td>
			<p dir="LTR">14.2.579.0</p>
			</td>
			<td>
			<p dir="LTR">14.2.566.0</p>
			</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.5</td>
			<td>14.2.589.5</td>
			<td>14.2.579.0</td>
			<td>14.2.566.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>64Gb</td>
			<td>14.2.589.5</td>
			<td>14.2.589.5</td>
			<td>14.2.579.0</td>
			<td>14.2.566.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="640faf1092b548cf896ce4ae4d6b3ae8" version="d55aa48595624e84b6fab853287504b6" lucid_version="MB002000JWFVN_MB004000JWFVP_ESXi@HPD4(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="911c76d50a064e62be53550825c8db4d" version="84e2116b45674552b8bf3699c3e4b249" lucid_version="EG000300JWFVB_ESXi@HPD3(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f10e85c0a8e4d0f99dcb8584f535fd3" version="03e8f61e1cba4567b4bd52d1c3dad906" lucid_version="EH000900JWHPP_EH000600JWHPN_EH000300JWHPL_x64@HPD8(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine &ldquo;sweeping&rdquo; of the media surface.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f22e031456d1410688940c3efe38cf1d" version="54af28136a8344539de0319ecd22b495" lucid_version="U48.win.x64@3.00_02-01-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.

This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 05.01.04.913.<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.</p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where Restore Manufacturing Defaults and Restore Defaults from iLO web did not restore the Secure Boot Status.</p><p></p><p>Addressed an issue where system might hang while accessing IML log from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b5747db463a34c8c8ef853b408ae6b5c" version="5eee57711b0a4c549d422bcdb3100886" lucid_version="e1r.w2k22@13.0.16.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="13.0.16.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="13.0.13.0 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which the component can&#39;t read the current driver version.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2b01702f6be343c09f8208f8aab17afb" version="6694fcaa2d604157b7ba3482c144da99" lucid_version="HPE_MR216i-a_Gen10P@52.26.3-5379__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="52.26.3-5379" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>7.26 Patch Release Beta Drop</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fix brick controller issue.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="52.26.3-5250" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>DMTF PLDM Redfish Device Enablement enhancements
	<ul>
		<li>iLO5 2.99, iLO6 1.54 or later versions are required.</li>
		<li>Added support for Chassis Data Model
		<ul>
			<li>GET Storage[Links][Enclosures]</li>
			<li>GET Chassis</li>
			<li>GET DriveCollection</li>
			<li>GET Drive[Status][State]=Absent (include empty bays under Chassis.)</li>
			<li>GET Drive[Links][Chassis]</li>
			<li>Note1: Drive URL will change to /redfish/v1/Chassis/{Id}/Drives/{Id}</li>
			<li>Note2: The empty bay resource ID is generated using &lt;Encl ID in upper byte&gt;:&lt;Bay Number in lower byte&gt;</li>
		</ul>
		</li>
		<li>Added support for Fabric Data Model
		<ul>
			<li>GET Fabric, SwitchCollection, Switch, PortCollection, Port</li>
		</ul>
		</li>
		<li>Added support the following Redfish Events
		<ul>
			<li>DriveMissing</li>
			<li>DriveMissingCleared</li>
			<li>DriveOffline</li>
			<li>DriveOfflineCleared</li>
			<li>VolumeOffline</li>
			<li>VolumeOfflineCleared</li>
		</ul>
		</li>
		<li>Added support for the following Redfish Annotations
		<ul>
			<li>@Redfish.AllowableValues (patch and post)</li>
			<li>@Redfish.AllowablePattern (patch and post)</li>
			<li>@Redfish.AllowableNumbers (patch and post)</li>
			<li>@Redfish.WriteableProperties (patch only)</li>
			<li>Note1: Any property not listed in the writeable properties list does not contain any other annotation.</li>
			<li>Note2: For VolumeCapabilities[@CapacityBytes.AllowableValues], the range is set from 1GiB to a maximum possible value of the RAID0 volume size considering the same type of the available &lsquo;n&rsquo; number of unconfigured drives. The CapacityBytes in the POST is not validated against the range in the VolumeCapabilities as the RAID Type and the number of drives, strip size and so on matter.</li>
		</ul>
		</li>
		<li>Added support for Redfish AutoVolumeCreate
		<ul>
			<li>GET/PATCH Storage[AutoVolumeCreate]</li>
			<li>MR200 will return AutoVolumeCreate=NonRAID, which remains the same as earlier firmware versions.</li>
			<li>MR400 will return AutoVolumeCreate=Disabled. Any newly added drive into a MR400 will no longer automatically appear as a JBOD and the user must configure the drive before using it.</li>
		</ul>
		</li>
	</ul>
	</li>
	<li>Added support for UBM7 backplanes</li>
	<li>Update to 2023.1 schema bundle</li>
	<li>Improve Copyback disable handling while copyback is in progress on drives</li>
	<li>Support new PSoC 6 part information display.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix a00133433en_us: HPE Compute MR Gen11 and Gen10 Plus Controllers - Controllers On HPE ProLiant AMD Gen11 Servers and Gen10Plus Servers Do Not Support Microsoft Secured-Core and AMD DMA Remapping (DMAr)</li>
	<li>Fix a00133091en_us: Storage Information Might Be Lost in iLO When Drives Are Behind MR Controllers In Passthrough Mode</li>
	<li>Fix a00134330en_us: HPE MR Gen10 Plus/Gen11 Controller - Non-Volatile Memory Express (NVMe) Drive FWPKG Flash Through HPE Integrated Lights-Out (iLO) Does Not Reflect the New Firmware Version on the Storage Page</li>
	<li>Fix an issue that NVMe passthrough command may hang when getting log page over 1MB data</li>
	<li>Fix an issue that setting JBOD shows sucessful, but JBOD does not appear to be created when all the target IDs (0 to 239) are exhausted.</li>
	<li>Fix an issue that Log Sense page 0x15 fails on ACS-5 supported SATA drive</li>
	<li>Fix an issue that crashdump.txt is taking longer than 15s to generate for ondemand snapdump</li>
	<li>Fix an issue that some snapdump prints flood the uart</li>
	<li>Fix a rare issue that logical drive data might be corrupted when expected power loss happens in the completion of copyback operation.</li>
	<li>Fix a rare issue that snapdump might not finish collecting events and generate incomplete snapdump when power off system</li>
	<li>Fix an issue that BatteryOK RDE alert was logged after every AC power cycle of the server</li>
	<li>Fix an issue that predictive failure RDE alert for a drive was logged twice on a single server reboot or controller reset</li>
	<li>Fix an issue that drive count for the enclosure might not be correct when pulling all drives simultaneously.</li>
	<li>Fix an issue that PLDM firmware update on drive fails when there are different drive models are connected to the controller</li>
	<li>Fix an issue that firmware might crash when the UBM controller is in non operational mode</li>
	<li>Fix Volume schema property IOPerfModeEnabled to be always enabled since it is dynamically decided by the controller</li>
	<li>Fix an issue that RSOD occurs when selecting the Enclosure Management for MR416i-p from System Utility Menu in ML30 Gen10 Plus</li>
	<li>Fix an issue that firmware fault might occurs when Self-Test page request is sent to the low power mode NVMe drive</li>
	<li>Fix an issue that Battery Charging Redfish Event is not generating</li>
	<li>Fix an issue that Status is not updated for the Volume resource when copyback operation is in progress</li>
	<li>Fix a rare issue that firmware fault might be observed while removing the foreign drives from the configuration</li>
	<li>Fix an issue that empty JSON PATCH request from REST client results in incorrect HTTP error code</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="58002f5fbb3c4bdca0598c03bb921813" version="a1fde9d430ff438eafbf63c7b8fa382a" lucid_version="MB010000JWAYK_MB008000JWAYH_ESXi@HPD6(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d0558c4ca40d4c1889688fd366d72022" version="eea0473f0fa3408ebaf6add4c0100569" lucid_version="MO000800JXBEV_MO001600JXBFP_MO003200JXBFQ_ESXi@HPD1(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="335ce4a972624f62a9d5631fe39baa81" version="6e93ab15a165404da57426d6dc8775eb" lucid_version="SmartDQ2.win2022@1010.124.100.1005-rev1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1010.124.100.1005" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added UBM6 backplane support.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1010.124.100.1005" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added UBM6 backplane support.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3b6a8a58b8154bb1b3a7b5b4416448b8" version="6407deba9be34a9981735977a2001ba4" lucid_version="MB016000JWXKH_x64@HPDA__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.</li>
	<li>The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.</li>
	<li>Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fbe68804b30c4fe28e13ea472cae5392" version="a7a34658ac834585933943ae7c21406b" lucid_version="MB008000GWWQU_MB006000GWWQT_ESXi@HPG8-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize thermal&nbsp;maximum continuous operation temperature values</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize thermal&nbsp;maximum continuous operation temperature values</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1bc921f76f2d48759522424a4aff4914" version="c62a40035c6847fd983483f40371e94b" lucid_version="U45.win.x64@3.10_02-22-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_10-19-2023 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where Restore Manufacturing Defaults and Restore Defaults from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="24bbe0adc4dc4c7385b6f5ad6aecf867" version="cecab4b5e4cd4424846a7f66bc0c8856" lucid_version="MK000480GWXFF_MK000960GWXFH_MK001920GWXFK_x64@HPG3(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improve the FW about data mismatch after SPL issued.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0d61334622ba44aeb0c163514d9f57b9" version="5e624274f10246c2868f94892f259169" lucid_version="MB004000GWKGV_x64@HPG1(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ec5fd859b967489ab6f67ad677712984" version="6ca7bb3961454f6dbc28fbf2d192fb9d" lucid_version="EH000900JWCPH_EH000600JWCPF_ESXi@HPDC-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDC" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize sensor reporting to improve failure rate - AFR (Annual Failure Rate) metrics</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDC" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimize sensor reporting to improve failure rate - AFR (Annual Failure Rate) metrics</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="667c48761fdd439199126de11a3666a8" version="5a80ed488e8841a9a9f331812c4a8d95" lucid_version="MicroServerGEN10PlusSPS.Linux@05.01.04.913(B)__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.913" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 05.01.04.913(B) contains updates to the firmware packaging and is functionally equivalent to ver. 05.01.04.913. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 05.01.04.913.</p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with Intel IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.913" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with Intel IPU.2023.3 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="01e0939311154208bbd5b8d9e5157a9c" version="6d7acffe122c4a109e95e48f660a998f" lucid_version="ssacli.win_x64@6.30.8.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="6.30.8.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>for 2024 March MSB</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.25.9.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3c5ca1f7884d46278989b90e474b83e1" version="6bf44308e7864140a11a972eaeb4b222" lucid_version="MB006000JWKGN_x64@HPD2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dedfd9d7098c498bab2315e3fb7e4b66" version="f14a08cec0464fa48f95779af6204841" lucid_version="Gen10P_MR216i-a_FW_Esxi@52.26.3.5379__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="52.26.3.5379" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Test</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fix brick controller issue</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a745e380a94147888b60792dcbb594a8" version="f3ae8dc2ee8a40af9b8f6db1c621d611" lucid_version="a42.fwpkg@3.00_01-26-2024__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p></p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:</p><p>/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.

This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.

This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.

This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-27-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.



This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC processors.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision provides AMD's mitigation for security vulnerabilities for CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.</p><p></p><p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2e5a37814cc1401a951db2b5be91b6b3" version="1d7dc5cbbe434b018cebca8de84638d4" lucid_version="KCD6XVUL800G_KCD6XVUL1T60_KCD6XVUL3T20_x64@GPK7(B)__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="GPK7" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="GPK6 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>
	<p>This component provides support only for VMD enabled Intel VROC platform</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8a01a8f2913f46979fa6206b3faeb0eb" version="d6fb1d4ef99c4109b23f8c124f6da43f" lucid_version="MZXLR800HBHQ-000H3_MZXLR1T6HBJR-000H3_MZXLR3T2_x64@MPK7725Q__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="MPK7725Q" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix known FW bug PI/CI indexing issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="MPK7625Q (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed CA&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8e4da865e5b44ea38e4b650ce9a93715" version="05bf481a558948eda4780cc35a1e1ea9" lucid_version="MB008000JWWQP_MB006000JWWQN_x64@HPD8(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="22bf9e4ced19410ca8b8850245112a89" version="7693833381de44d181d831c79ce6ab05" lucid_version="MO0200JEFNV_MO0400JEFPA_MO0800JEFPB_MO1600JEF_ESXi@HPD3(K)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (K)" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b197b25ba5a84d17992b28174218a00a" version="abd79d13f0a54f72bace85a691a0ff00" lucid_version="VK000960JWSSQ_VK001920JWSSR_VK003840JWSST_ESXi@HPD8(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>

<p>&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b5c5978ca68a42089c65763237c54346" version="dcb369b801454a9eb55c85ec85712fdf" lucid_version="VK000960JWSSQ_VK001920JWSSR_VK003840JWSST_x64@HPD8(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2e589cc6a48f40eaa0870785c3351832" version="cd4a1669519b4e37977e667c5d389948" lucid_version="U37.win.x64@3.10_02-22-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where Restore Manufacturing Defaults and Restore Defaults from iLO web did not restore the Secure Boot Status.</p><p></p><p></p><p>Addressed an issue where BIOS did not report CPU status correctly to iLO, and OneView would receive notification when Uncorrectable Machine Check Exception (UMCE) occurs.</p><p></p><p></p><p>Addressed an issue where system might hang while accessing IML logs from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9ea83d5d4cdf449690664479d7c8538a" version="a394138615a445aca0d9dace4ca970b9" lucid_version="MB006000JWKGN_x64@HPD2(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9a8025d60954436ba6fa5cef6da3dd18" version="782673c162f84be1a26d4be42e8ee6b2" lucid_version="DL20GEN10Plus_ME.fwpkg@06.00.03.604__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="06.00.03.604" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This version of the SPS should be paired with System ROM 2.00 (02/01/2024) or later.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Enhancements/New Features:</strong></p><p>This version is in compliance with IPU.2024.1 guidance.</p><p><strong>Known Issues:</strong></p>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="06.00.03.505" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ac4d46dcda694f51abe34e6378a53487" version="c99a52ece7f849fe8747ed3d1292fd8d" lucid_version="MLNX_Ethernet_Only_NIC_FW_package.esxi80@1.0.3-rev1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</li>
	<li>817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following device has been&nbsp;updated to 16.35.3006:</strong></p>

<ul>
	<li>874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 2.42.5044 :</strong></p>

<ul>
	<li>779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)</li>
	<li>779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</li>
	<li>817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following device has been&nbsp;updated to 16.35.3006:</strong></p>

<ul>
	<li>874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0a948acc38544887a2673660c4e996dc" version="7eaa184fb4194b009b9ea5eb9bb1f0ac" lucid_version="mlnx_mft.rhel9u3.x86_64.rpm@4.26.1-3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.26.1-3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e9a45a84fc5a4ae9bee13ee0419530ca" version="08eec262b20447e6a01c5c33148f193a" lucid_version="U47.Linux@2.00_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.<br />
This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel&#39;s mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.&nbsp; This issue is not unique to HPE servers.<br />
Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.<br />
Addressed an issue where NVME hot plug when installing fully loaded NVME drives.<br />
Addressed a potential security vulnerability in some 3rd and 4th Generation Intel&reg; Xeon&reg; Processors when using Intel&reg; Software Guard Extensions (SGX) or Intel&reg; Trust Domain Extensions (TDX) may allow escalation of privilege, as documented in CVE-2023-22655.<br />
Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.<br />
Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.<br />
Addressed an issue where the iSCSI SW ipv6 HDD could not be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address Type.<br />
Addressed an issue where setup options of the BIOS Configuration (RBSU) utility may not be synchronized to the latest state when a server is idle in RBSU for more than 30 minutes.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.</p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.</p><p>Addressed an issue where NVME hot plug when installing fully loaded NVME drives.</p><p>Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.</p><p>Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.</p><p>Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt > select Network device > IP Address Type.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="703e98acf33d484a9d2825573e86e8c0" version="0356225654ef4ecbb79387273ec0d41b" lucid_version="U38.fwpkg@3.10_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="be56d38accd045cca89d446f2db8440b" version="3fe3b497fc3949c3b0de2ea02c45f016" lucid_version="nicfwupg_intel.win64_Gen9_Gen10@5.3.6.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.3.6.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.3.5.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where the firmware installation exceeds the expected time by using Oneview to update Firmware with 568FLR-MMSFP+.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="707803ff432e4432b9c2ea604ffe836c" version="460715a6f64343c1a87ff64e12135227" lucid_version="MK000480GWCEV_MK000960GWCFA_MK001920GWCFB_x64@HPG3(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5f5babdc8edb43cda68a851809a46823" version="0f794aee1d1e40bf82d5d0a7e4cd85bb" lucid_version="MB014000JXUCC_x64@HPD4__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed&nbsp;issue of self-initiated resetting of drives under queue full handling situations</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="14a34b53e24b40f2b222860f24cf2648" version="c869ecf81db44995b57e2f7974b876a6" lucid_version="bnxt_roce.sles15sp5@228.0.133.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="228.0.133.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.0.130.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed a system crash issue observed on running RoCE and L2 IO with Virtual Function creation/deletion and triggering firmware error recovery.</li>
	<li>This product fixed a system crashed issue while running the RoCE hammer on Wh+ with 8K pertest and 8K graf work QP&#39;s.</li>
	<li>This product fixed an issue that RoCE driver took longer time than expected to close in PCIe-AER fatal error.</li>
	<li>This product fixed RoCE error recovery fails upon injecting error on Thor&nbsp;adapter with 32K qps ib_send_bw IO.</li>
	<li>This product disabled RoCE LAG support for Wh+.</li>
	<li>This product restriced RoCE resources for Wh+ adapters.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1e4f77062f4d48c8906f4212d8016a76" version="fd1d95e30a1448d097e27fb6881debaa" lucid_version="a48.linux@3.00_01-26-2024(B)__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_01-26-2024" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:
/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 3.00_01-26-2024.</p>

<p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors. This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors. This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers. This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575. This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers. This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575. This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.00_01-26-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and Windows UEFI CA 2023, since the original keys will expire in 2026.</p><p>Added the System Configuration (RBSU) option "Boot Options/UEFI Boot Settings/Filter Non-bootable Drives" and set to "Auto" by default. This setting has the following Redfish property:
/redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C for AMD 3rd Generation EPYC processors.
This revision of the System ROM includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC processors.
This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the mitigation for security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC processors. This security vulnerability is documented in the CVE report site. This issue is not unique to HPE servers.
This revision of the System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability documented as CVE-2021-38575.
This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8160f18bf46a4d4bb912b9b35f631323" version="0c10a4911041471e905ad251e4b6df6e" lucid_version="EG1800JEHMD_x64@HPD6(J)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="110c3bd2bca349b2ba7b9fec9e58ee8d" version="c9583ec6c1c943448dfa0a2b88748736" lucid_version="nicfwupg_bcm_open.linux_x64@2.36.0__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="2.36.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports GetPackageStatus NCSI Command.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.35.3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed abnormal fan behavior when BCM5719 OCP3 installed.</li>
	<li>This product addressed the failure of IP dispatch when using BCM5719 LOM as shared iLO networking.</li>
	<li>This product addressed that platform might encounter a POST failure when NX1-based controllers and some storage controllers combines.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="07a177efdb914ccfaea8cc2d7cc450db" version="228e83b0de7f45f28dd2e21dcbbd3009" lucid_version="VK0400JEABD_VK0800JEABE_VO1600JEABF_ESXi@HPD4(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0a96bc740aee4364b774edfa452ca9a4" version="0c19a2952513499caee19f0600206b23" lucid_version="EH000900JWHPP_EH000600JWHPN_EH000300JWHPL_x64@HPD8(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine &ldquo;sweeping&rdquo; of the media surface.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine &ldquo;sweeping&rdquo; of the media surface.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a162b7594d8d4a02bf2f3f7d9fe2609d" version="88826b259b8549ed8b31836b00e8a0f9" lucid_version="igb.sles15@6.14.16-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="6.14.16-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;SUSE Linux Enterprise Server 15 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.14.16-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;SUSE Linux Enterprise Server 15 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="966974f2ab9a4657a90227f18e4fbb1c" version="cd7d3efe119e4ddbac6fec91b5eecf10" lucid_version="VK000960GXCLD_VK001920GXCGP_VK003840GXCGQ_ESXi@HPG3(C)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3ab4de78da484144892d6ddcd8fd9b97" version="8ccfbb791e9b4a439fa27dba6dfe1da4" lucid_version="ixgbe.sles15@5.19.6-1(C)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.19.6-1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;SUSE Linux Enterprise Server 15 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.19.6-1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;SUSE Linux Enterprise Server 15 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4fd1e8e4a27347cd8d83d1e63d9eb38e" version="28f1291d89da481f88dcf14faa29d404" lucid_version="MB006000GWKGR_x64@HPG1(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9548ad0612e149baa76eccbb5ce95cee" version="a090d0bccabe4c1b864bbf3a66514965" lucid_version="MO001600KWVNB_MO003200KWVNC_MO006400KWVND_x64@HPK3(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2b0745f5d1b9423aa88e57ad4cdfbe00" version="5838d97d78ad4a8f9ce336213bb94ea6" lucid_version="MB002000JWFVN_MB004000JWFVP_x64@HPD4(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b23cbcef087a471c988db0eccfc20ffd" version="b69f69e88a034dd7bf5ebc2a6d493ce6" lucid_version="MB8000JFECQ_x64@HPD7(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="96868d9680c84d50b81011a5d4811094" version="fd398e8751834c888577e5f28488e6ca" lucid_version="MB2000JFDSL_MB4000JFDSN_x64@HPD4(I)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a83500e26a4d4bb89a4eb5821b7b2ca6" version="ce564244e9094a189f86e42aa3e682f9" lucid_version="amdpshed.win2022.x64@1.0.0.50__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.50" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Driver update</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.49 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Gen10/Gen10 Plus platforms</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="85555c0bf7a54baebd117b6f0dbd865a" version="1a1715ec51d8474abe1a6b45305d5525" lucid_version="MB1000JVYZL_MB2000JVYZN_MB3000JVYZP_x64@HPD3(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5fcadb289d2a4581aa347222e1e2d7d1" version="bbe97ab7bccc4b15af7927930f5794b5" lucid_version="nicfwpkg_bcme_open@228.1.111.0__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="228.1.111.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product fixed the failure capture of connection status in IML log due to RDE entry not properly implemented.</li>
	<li>This product fixed the problem that some RDE address management properties could not be applied simultaneously.</li>
	<li>This product fixed the sequence to store PLDM Monitoring and Control events before BMC&#39;s SetEventReceiver command.</li>
	<li>This product fixed the problem of port Reset command not forcing 10G module to shut down link properly.</li>
	<li>This product fixed the problem of PFC flood if shutdown the system while running RoCE traffic.</li>
	<li>This product fixed the fix of NC-SI Get NC Capabilities and Settings response MaxPFs value.</li>
	<li>This product fixed the restriction of PF/VF bar sizes to valid values.</li>
	<li>This product fixed random Whp-livepatch failure due to out-of-order function.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="227.1.111.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addressed PFC flood problem when shut down system while running RoCE traffic.</li>
	<li>This product addressed PCIeVDM communication problem between BMC and NIC after an error recovery.</li>
	<li>This product addressed the PHY level packet drop.</li>
	<li>This product addressed the problem of multi-cast traffic gets leaked to unintended functions.</li>
	<li>This product addressed the reporting mechanism of NCSI max temperature.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="00184010ed0a41829836f7c60269273f" version="e562774ab51a41ce9515044ddb302a71" lucid_version="MLNX_Ethernet_Only_NIC_FW_package.x64@1.0.0.20__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 2.42.5044 :</strong></p>

<ul>
	<li>779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)</li>
	<li>779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</li>
	<li>817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following device has been&nbsp;updated to 16.35.3006:</strong></p>

<ul>
	<li>874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;</li>
</ul>

<p><strong>New features and changes included in version 16.35.3006:</strong></p>

<ul>
	<li>Enabled ACS for single port cards.</li>
	<li>Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>

<p><strong>The following issues have been fixed in version 16.35.3006:</strong></p>

<ul>
	<li>Packet loss that occurred when restarting the transmit.&nbsp;</li>
	<li>An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).</li>
	<li>A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).</li>
	<li>Added a missing VLAN strip.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.19" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices has been updated to 2.42.5044 :</strong></p>

<ul>
	<li>779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)</li>
	<li>779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</li>
</ul>

<p><strong>Firmware for the following devices has been updated to 14.32.1010:</strong></p>

<ul>
	<li>817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</li>
	<li>817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</li>
</ul>

<p><strong>Firmware for the following device has been&nbsp;updated to 16.35.1012:</strong></p>

<ul>
	<li>874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</li>
</ul>

<p>&nbsp;</p>

<p><strong>New features and changes included in version 14.32.1010:</strong></p>

<ul>
	<li>Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.</li>
	<li>Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its &nbsp;rate limit.</li>
	<li>Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.</li>
	<li>Limited the external loopback speed to the used module&#39;s capabilities.</li>
	<li>Improved linkup time when using the fast linkup capability.</li>
	<li>Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</li>
</ul>

<p>.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</p>

<p><strong>New features and changes included in version 16.35.1012:</strong></p>

<ul>
	<li>Added support for copy modify header steering action to/from the UDP field.</li>
	<li>Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.</li>
	<li>QoS priority trust default state can now be changed using the new nvconfig below:
	<ul>
		<li>QOS_TRUST_STATE_P1</li>
		<li>QOS_TRUST_STATE_P2</li>
	</ul>
	</li>
</ul>

<p style="margin-left:40px">The values that can be used to set the default state are:</p>

<ul style="margin-left:40px">
	<li>TRUST_PORT</li>
	<li>TRUST_PCP</li>
	<li>TRUST_DSCP</li>
	<li>TRUST_DSCP_PCP</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>The following issues have been fixed in version 14.32.1010:</strong></p>

<ul>
	<li>Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.</li>
	<li>The system could not create more than 128K QPs.</li>
	<li>On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.</li>
	<li>Packet Pacing rate was used if asymmetric VFs was enabled.</li>
	<li>Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.</li>
	<li>Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.</li>
	<li>The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</li>
</ul>

<p>&nbsp;</p>

<p><strong>The following issues have been fixed in version 16.35.1012:</strong></p>

<ul>
	<li>RDE (Redfish) PATCH operation to LLDPTransmit properties &quot;ManagementAddressIPv4&quot;, &quot;ManagementAddressIPv6&quot; and &quot;ManagementAddressMAC&quot; were applied only in the first attempt, but failed in the next.</li>
	<li>PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.</li>
	<li>Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions.&nbsp;</li>
	<li>InfiniBand L2 QP could not receive RDMA traffic occasionally.</li>
	<li>Running with a debug firmware reduced security as if token was applied.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e485f42530b84989a3373bff82088143" version="2ba0d284f1ad451c92f3615782d9438e" lucid_version="amdpshed.win2019.x64@1.0.0.50__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.50" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Driver update</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.49 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Gen10/Gen10 Plus platforms</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4de9a363a422456faca983d193ca352a" version="05730dbad205490a940bddceb13104d6" lucid_version="U31.fwpkg@3.10_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d217387da75b452f91f63bc9a4605e37" version="428fcbfccff545218b48b6baa7284c2d" lucid_version="emulex_storport_x64.w2k19_rt@14.2.537.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="14.2.537.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;14.2.537.0</p>

<p>The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="14.0.534.0 (c)" revision="c" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;14.0.534.0</p>

<p>The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3e81763b3821481db4fe370a0e06c011" version="0be7b95c143147138274563e3e29c529" lucid_version="VK000240GXAWE_VK000480GXAWK_VK000960GXAWL_x64@HPG1(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2b44e5307a9948769c51d6ac1f276915" version="5290ccce6bb34e1984e8d271c8340373" lucid_version="U41.fwpkg@3.10_02-22-2024-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.10_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.01.05.002.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p>

<p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p>

<p>Addressed an issue where the server may hang due to an IE function error.</p>

<p>Merged the solutions from EDK2 for vulnerabilities:</p>

<p>- Buffer overflow in the DHCPv6 client via a long Server ID option</p>

<p>- Out-of-bounds read when handling a ND Redirect message with truncated options</p>

<p>- Infinite loop when parsing unknown options in the Destination Options header</p>

<p>- Infinite loop when parsing a PadN option in the Destination Options header</p>

<p>- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p>

<p>- Predictable TCP ISNs</p>

<p>- Use of a Weak PseudoRandom Number Generator</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.10_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Patch for CVE-2021-38575: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p></p><p>Patch the primary APIC ID for SMBIOS type 211: Some special CPUs may not have an intra-processor APIC ID == 00h and may cause wrong TControl data.</p><p></p><p>Patch for CVE-2023-45853: The vulnerability allows a remote attacker to execute arbitrary code on the target system.</p><p>The vulnerability exists due to a boundary error in the IScsiHexToBin() function in NetworkPkg/IScsiDxe. A remote attacker with ability to inject data into communication between edk2 and the iSCSI target can execute arbitrary code on the target system.</p><p></p><p>Prevented a non-standard VPD content from causing the UEFI read function to become write.  </p><p></p><p>Patch for CVE-2022-36763 and CVE-2022-36764: EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.</p><p></p><p>Added a new event support for IML.</p><p></p><p>Patch for CVE-2023-45229: EDK2 NetworkPkg Vulnerability</p><p></p><p>Added an additional retry mechanisms to avoid a BIOS hang from iLO failure.</p><p></p><p>Corrected Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where SBCE and ECC storm records may disappear from AHS.</p><p></p><p>Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the iSCSI IpAddressType is set to Auto.</p><p></p><p>Addressed an issue where the server may hang due to an IE function error.</p><p></p><p>Merged the solutions from EDK2 for vulnerabilities: </p><p>  - Buffer overflow in the DHCPv6 client via a long Server ID option</p><p>  - Out-of-bounds read when handling a ND Redirect message with truncated options</p><p>  - Infinite loop when parsing unknown options in the Destination Options header</p><p>  - Infinite loop when parsing a PadN option in the Destination Options header</p><p>  - Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</p><p>  - Predictable TCP ISNs</p><p>  - Use of a Weak PseudoRandom Number Generator</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c5181c3bc0654e9db312aa6200639426" version="4d05572471a0455abbee63e6cf0cfcf2" lucid_version="U44.win.x64@3.00_02-01-2024__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="3.00_02-01-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Redfish Property value changed from vN_N_N to N.N.N in uri:</p><p>    /redfish/v1/registrystore/registries/{lang}/biosattributeregistry{Platform}.vN_N_N</p><p>    there, {lang} = { en, ja, zh }, {platform} = Platform Name e.g. A55, U63 , vN_N_N =</p><p>    version number defined as Redfish specification</p><p>    [Example]</p><p>    uri: /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20</p><p>    Property of RegistryVersion is changed from v1_1_20 to 1.1.20</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.

This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.

This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.

This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.

This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 05.01.04.913.<p><strong>Firmware Dependencies:</strong></p><p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance.</p><p>This revision of the System ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853 and CVE-2021-38575.</p><p>This revision of the System ROM includes the revision of the OpenSSL library 1.0.2zi update which provides mitigation for security vulnerabilities documented as CVE-2023-3817.</p><p>This revision of the System ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.</p><p>Addressed an issue where the operating system cannot detect the iSCSI hard drive through IPv6 installation if the iSCSI IpAddressType is set to auto.</p><p><strong>Known Issues:</strong></p>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.90_10-19-2023" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Replaced "AC power" with "external power" in the help text of "Automatic power-on" option. This is due to ProLiant servers also provide the DC power supply option.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where “Restore Manufacturing Defaults” and “Restore Defaults” from iLO web did not restore the Secure Boot Status.</p><p></p><p>Addressed an issue where system might hang while accessing IML log from RBSU.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2a95310f5de64c9fad6c33cfacf5d307" version="47d9b62ff70a4376aa8f01b7e6d97b49" lucid_version="VK000480GZCNE_VK000960GZCNF_VK001920GZCNH_x64@HPG3__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improve the FW about data mismatch after SPL</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Sever 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="36bcc8676cfa4135862a614c063902e6" version="2c7f3e7cd441431cbd0b25d9b556851a" lucid_version="VK000960JWSSQ_VK001920JWSSR_VK003840JWSST_x64@HPD8(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="07117e80b64248dab9811a2280fcc85e" version="4eaaab702ba944958435c8929c13b50a" lucid_version="qlogic_storport_x64.w2k22_rt@9.4.9.21__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="9.4.9.21" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version&nbsp;9.4.9.21</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.4.8.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version&nbsp;9.4.8.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a77901ff235c43f18df58616eefb654e" version="f7fb9ac911094f59a11babd3bc17e2d7" lucid_version="FWPKG-P46603-B21@26.38.1002__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="26.38.1002" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New features and changes included in version 26.38.1002:</strong></p>

<ul>
	<li>Enabled 200Gb/s out-of-the-box throughput on crypto capable devices.<br />
	Note: If any crypto offloads is in use, 200Gb/s throughput can be achieved only after the next firmware reset</li>
	<li>Added support for VF migration. The hypervisor can now suspend its VF, meaning from that point the VF cannot perform action such as&nbsp;send/receive traffic or run any command. In this firmware version only the suspend resume mode is supported (on the same VM).</li>
	<li>Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the&nbsp;hierarchy information stored on the node and the physical port.</li>
	<li>Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations&nbsp;issued by the software.<br />
	Note: If the Keep Link Up NV configuration is changed, phyless reset will be blocked.</li>
	<li>Added Precision Time Protocol (PTP) support.<br />
	In this version, the support includes:<br />
	16 PTP SQs only<br />
	only 2 ports<br />
	only RT clock mode<br />
	In this version, the following are not supported:<br />
	PTP packet drop<br />
	PTP SQ on VF<br />
	Note: All PTP SQs must be closed before operating LFWP (life fw patch).</li>
	<li>Added support for HW Steering objects dump via resource dump interface.<br />
	This support includes: STC, RTC, STE, modify argument, and modify pattern.</li>
	<li>Added support for VF migration.</li>
	<li>Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.</li>
	<li>Added support for creating a steering definer with a dword selector using create_match_definer_object and the &quot;SELECT&quot; format.</li>
	<li>Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide&nbsp;information on the syndrome type and which side caused&nbsp;the error.</li>
	<li>[Beta] Added HW Steering support for the following:<br />
	set, add and copy inline STC action<br />
	set and copy actions for several fields using modify_pattern object and inline stc modify action<br />
	FDB mode in HW steering using FDB_RX and FDB_TX flow table types<br />
	ASO flow meter action via STC<br />
	flow counter query using ASO WQE<br />
	allocation of large bulks for the objects: STE, ASO flow meter and modify argument<br />
	jumbo match RTC<br />
	count action in STC</li>
	<li>Added support for holdover mode to comply to SyncE specifications (EEC compliance) to limit the maximum phase transient response upon&nbsp;link loss.&nbsp;</li>
	<li>Added support for noise filtering to comply to the SyncE specifications requirements.</li>
	<li>Optimized the performance of vDPA virtio including: throughput, QoS, and accuracy of min/max bandwidth when virtio works with the QoS&nbsp;settings.</li>
	<li>The new vDPA virtio-net Full Emulation capability reduces the switchover time of creating a virtq from scratch during live migration, by creating the virtq beforehand on&nbsp;the target server.<br />
	When swithover happens, the pre-created virtq will be used and modified with necessary parameters.</li>
	<li>Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as&nbsp;0 anymore.</li>
	<li>Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.&nbsp;</li>
	<li>Enabled the option to modify the ip_ecn field in the packet header in firmware steering.</li>
	<li>Added support for advanced ZTR_RTTCC algorithm based on the Programmable CC platform to achieve better congestion control without&nbsp;dependency on the switch ECN marking.</li>
	<li>DIM is used to tune moderation parameter dynamically for vDPA using an mlxreg command.<br />
	To disable this capability, run:<br />
	mlxreg -d /dev/mst/mt41686_pciconf0 --reg_id 0xc00d --reg_len 0x8 -s &quot;0x4.1:1=0x0&quot;</li>
	<li>Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the&nbsp;software performs the sync operation using the using sync_steering command.</li>
	<li>Modified the maximum bulk size per single allocation from &quot;log_table_size - log_num_unisizes&quot;, to allocate any range size, to&nbsp;remove limitations that HWS objects such as counters and modify arguments might encounter.&nbsp;</li>
	<li>Added support for creating a dynamic flex parser on untrusted function, and changed the flex parser cap for untrusted function to the&nbsp;following: &nbsp;<br />
	maximum flex parser node = 2<br />
	maximum dw sample = 4</li>
	<li>Added support for SNAPI (comm-channel) connection while running on raw ETH link.</li>
	<li>Crypto features can be in either wrapped or unwrapped mode. Meaning, the key can be wrapped or in plaintext when running the&nbsp;CREATE_DEK PRM command.<br />
	To comply with the requirements specified in FIPS publication, all the created DEKs must be wrapped.<br />
	This feature adds new NV_CONFIG per device to control this mode, and enables the user to change all the crypto features to wrapped or&nbsp;cleartext.</li>
	<li>[Beta] A new capability that enables the software to directly access ICM and write/modify the DEK objects. Such change improves the DEK&nbsp;object update rate by re-using DEK object instead of creating a new one.<br />
	In addition, added the following:<br />
	New for DEK object: bulk allocation, modify_dek cmd, and new mode - sw_wrapped.<br />
	New general object INT_KEK</li>
</ul>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="22.33.1048" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New features and changes included in version 22.33.1048:</strong></p>

<ul>
	<li>Enabled 200Gb/s out-of-the-box throughput on crypto capable devices.<br />
	Note: If any crypto offloads is in use, 200Gb/s throughput can be achieved only after the next firmware reset</li>
	<li>Added support for VF migration. The hypervisor can now suspend its VF, meaning from that point the VF cannot perform action such as&nbsp;send/receive traffic or run any command. In this firmware version only the suspend resume mode is supported (on the same VM).</li>
	<li>Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the&nbsp;hierarchy information stored on the node and the physical port.</li>
	<li>Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations&nbsp;issued by the software.<br />
	Note: If the Keep Link Up NV configuration is changed, phyless reset will be blocked.</li>
	<li>Added Precision Time Protocol (PTP) support.<br />
	In this version, the support includes:<br />
	16 PTP SQs only<br />
	only 2 ports<br />
	only RT clock mode<br />
	In this version, the following are not supported:<br />
	PTP packet drop<br />
	PTP SQ on VF<br />
	Note: All PTP SQs must be closed before operating LFWP (life fw patch).</li>
	<li>Added support for HW Steering objects dump via resource dump interface.<br />
	This support includes: STC, RTC, STE, modify argument, and modify pattern.</li>
	<li>Added support for VF migration.</li>
	<li>Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.</li>
	<li>Added support for creating a steering definer with a dword selector using create_match_definer_object and the &quot;SELECT&quot; format.</li>
	<li>Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide&nbsp;information on the syndrome type and which side caused&nbsp;the error.</li>
	<li>[Beta] Added HW Steering support for the following:<br />
	set, add and copy inline STC action<br />
	set and copy actions for several fields using modify_pattern object and inline stc modify action<br />
	FDB mode in HW steering using FDB_RX and FDB_TX flow table types<br />
	ASO flow meter action via STC<br />
	flow counter query using ASO WQE<br />
	allocation of large bulks for the objects: STE, ASO flow meter and modify argument<br />
	jumbo match RTC<br />
	count action in STC</li>
	<li>Added support for holdover mode to comply to SyncE specifications (EEC compliance) to limit the maximum phase transient response upon&nbsp;link loss.&nbsp;</li>
	<li>Added support for noise filtering to comply to the SyncE specifications requirements.</li>
	<li>Optimized the performance of vDPA virtio including: throughput, QoS, and accuracy of min/max bandwidth when virtio works with the QoS&nbsp;settings.</li>
	<li>The new vDPA virtio-net Full Emulation capability reduces the switchover time of creating a virtq from scratch during live migration, by creating the virtq beforehand on&nbsp;the target server.<br />
	When swithover happens, the pre-created virtq will be used and modified with necessary parameters.</li>
	<li>Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as&nbsp;0 anymore.</li>
	<li>Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.&nbsp;</li>
	<li>Enabled the option to modify the ip_ecn field in the packet header in firmware steering.</li>
	<li>Added support for advanced ZTR_RTTCC algorithm based on the Programmable CC platform to achieve better congestion control without&nbsp;dependency on the switch ECN marking.</li>
	<li>DIM is used to tune moderation parameter dynamically for vDPA using an mlxreg command.<br />
	To disable this capability, run:<br />
	mlxreg -d /dev/mst/mt41686_pciconf0 --reg_id 0xc00d --reg_len 0x8 -s &quot;0x4.1:1=0x0&quot;</li>
	<li>Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the&nbsp;software performs the sync operation using the using sync_steering command.</li>
	<li>Modified the maximum bulk size per single allocation from &quot;log_table_size - log_num_unisizes&quot;, to allocate any range size, to&nbsp;remove limitations that HWS objects such as counters and modify arguments might encounter.&nbsp;</li>
	<li>Added support for creating a dynamic flex parser on untrusted function, and changed the flex parser cap for untrusted function to the&nbsp;following: &nbsp;<br />
	maximum flex parser node = 2<br />
	maximum dw sample = 4</li>
	<li>Added support for SNAPI (comm-channel) connection while running on raw ETH link.</li>
	<li>Crypto features can be in either wrapped or unwrapped mode. Meaning, the key can be wrapped or in plaintext when running the&nbsp;CREATE_DEK PRM command.<br />
	To comply with the requirements specified in FIPS publication, all the created DEKs must be wrapped.<br />
	This feature adds new NV_CONFIG per device to control this mode, and enables the user to change all the crypto features to wrapped or&nbsp;cleartext.</li>
	<li>[Beta] A new capability that enables the software to directly access ICM and write/modify the DEK objects. Such change improves the DEK&nbsp;object update rate by re-using DEK object instead of creating a new one.<br />
	In addition, added the following:<br />
	New for DEK object: bulk allocation, modify_dek cmd, and new mode - sw_wrapped.<br />
	New general object INT_KEK</li>
</ul>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 22.33.1048:</strong></p>

<ul>
	<li>vDPA traffic unbalance issue in active-backup VF LAG mode.</li>
	<li>Implemented SLD detection code. Surprise Down Error Reporting Capable value was changed from 1 to 0 in boards where the downstream perst was not&nbsp;controlled thus causing SLD detection not to function properly.</li>
	<li>An issue that occured after powering off DC in Multi-Host system which resulted in OOB connection to the BMC getting lost (and fatal error appeared) due to a firmware bug in the PCIe flush flow.<br />
	The issue was fixed by increasing the flush time and not waiting for PCIe credits to return to default values.</li>
	<li>A rare HW/FW timing race of serdes&#39; power-up sequence.</li>
	<li>Rare lanes skew issue that caused CPU to timeout in Rec.idle.</li>
	<li>An issue that resulted in temporary packet drops while changing PTP/FCS configuration when the links were up.</li>
	<li>Optimized the virtio data path to reach line speed for Tx bandwidth.</li>
	<li>An issue that resulted in notification indicator mistakenly being reported as FATAL thus, raising false indication.</li>
	<li>Bad cache invalidations of destroyed QPs.</li>
	<li>A configuration issue which flipped the MSB of Partition Key field in CNP packets and led to P_KEY mismatch between CNP packets and regular packets.</li>
	<li>An issue that resulted in wrong port calibration due to incorrect mapping of the port during initialization stage.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6ca4dd262131408db10af90451555128" version="424f5450404446d3890743a2fada22e9" lucid_version="FWPKG-P23666-B21@20.40.1000__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.40.1000" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p>&nbsp;</p>

<p><strong>No New features or changes have been included in version 20.40.1000.</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.40.1000:</strong></p>

<ul>
	<li>RDE LLDPTransmit ChassisID was occassionally not represented correctly.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="20.39.1002" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your device&#39;s firmware to this release to improve the firmware security and reliability of your device.</p>

<p><strong>New features and changes included in version 20.39.1002:</strong></p>

<ul>
	<li>Get Temperature OEM command now always returns a unified temperature.</li>
	<li>Enabled Management Component Transport Protocol (MCTP) over PCIe.</li>
	<li>Added a caching mechanism to improved expansion ROM performance and to avoid any slow boot occurrences when loading the expansion ROM driver.</li>
	<li>Added new support for reserved mkey index range. When enabled, a range of mkey indexes is reserved for mkey by name use.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No new fixes have been included in version 20.39.1002.</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b4de54a776434c1baf230d968d3bb23f" version="9fe0a716083a47649b1df0d31413a23f" lucid_version="VK000240GZXRU_VK000480GZXRF_VK000960GZXQU_x64@HPG1__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e8f02987fae14861a37eb27a43adf117" version="eb84263d84be423fa6a977ec85bc3399" lucid_version="Gen10P_Gen11_hpemrsa.win.x64@8.6.18.0__sc-windows_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="8.6.18.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>7.26 Dec RC Drop</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.4.16.0 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Do not allow remote access. This enhancement address the issue mentioned in a00129966en_us: HPE MR Storage Administrator (MRSA) - Remote Access is Not Supported By Default Due To Security Concerns</li>
	<li>Remove Reload function in Server Dashboard. The function is the same as browser&rsquo;s reload.</li>
	<li>Support HPE ML30 and DL20 Gen11 server.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="84d998355c4f4bc6997437e9a6c61fba" version="d22dfdb96b3a4e388b209cec25097147" lucid_version="SPSGen10.Linux@04.01.05.002(B)__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="04.01.05.002" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 04.01.05.002(B) contains updates to the firmware packaging and is functionally equivalent to ver. 04.01.05.002. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 04.01.05.002.</p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="04.01.05.002" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This version is in compliance with IPU.2023.3 guidance.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e0019db6f6e24588a441b6cb4e743087" version="fb8b975529bf4ee68a06d176cb2f9251" lucid_version="switchtec.pciesw.win.x64@1.0.0.0(B)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.0" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated SBOM requirement</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update version</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1d54c8dcf99741aabe78b8a4e54d84f8" version="4f35beb81dc8450aaf2123e27e4e6a7b" lucid_version="MB014000JWRTH_MB012000JWRTF_MB010000JWRTE_x64@HPD2(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ff5f0967b6c84e77920662313dc42a52" version="d44e45be98304a659b03332481082cd1" lucid_version="MB010000GWAYN_MB008000GWAYL_x64@HPG5(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3b83490f55194800be58721a957dd6a1" version="13e09bfd95944457b2e319bfd95deb39" lucid_version="MB012000GWTFE_MB014000GWTFF_x64@HPG8(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for potential hangs and timeouts, tuning fixes based on field experience and maintenance logging items</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for potential hangs and timeouts, tuning fixes based on field experience and maintenance logging items</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ada4d6aedd4b4604b810f81be7da5b19" version="ccf7887d5406432baf832e85536d91f4" lucid_version="EH0300JDYTH_EH0450JDYTK_EH0600JDYTL_x64@HPD6(M)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="M" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (L)" revision="L" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f08c2998f0194b1483b2e21050a3b5a3" version="58c25439e8f94f47aa4ac3175bfa76f8" lucid_version="MB6000GEBTP_ESXi@HPG4(K)-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (K)" revision="K" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eba2d683ef74457085f02d6700a97d49" version="6d60aad243054bbc9ffaed6fe077ded9" lucid_version="VK000960GXCLD_VK001920GXCGP_VK003840GXCGQ_x64@HPG3(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Firmware Capacity charge timeout threshold is increased to 14 seconds.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cb2be7d18951448db0daf6ce3cff2a1c" version="1f1302748e31445a9895f667ff6d9294" lucid_version="EG1800JFHMH_x64@HPD8(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a07f8ac11b4a440d99aa61ea5fb0b63f" version="e0a557b1c0b14744900c9cacc185cb5a" lucid_version="bnxtnet.vmware80@2024.03.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2024.03.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2023.11.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product enhances to added support for ens queue-stats multi-queue.</li>
	<li>This product enhances Update Driver logging as more generic.</li>
	<li>This product enhances to ENS driver to avoid blocking calls.</li>
	<li>This product enhances the Collection of Firmware debugging data in different scenarios.</li>
	<li>This product enhances to enable software/stack checksum calculation.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue where Fixed PSOD for rx-ring size less than 256 use case.</li>
	<li>This product corrects an issue where Fixed checksum issues for tunnel packets in ENS mode.</li>
	<li>This product corrects an issue where Fix VXLAN tunnel port config failure during driver reload.</li>
	<li>This product corrects the issue where Failing to bring up maximum number of VFs.</li>
	<li>This product corrects an issue where Fix Invalid memory access when DCB （Data Center Bridging） access alloc fails during driver load.</li>
	<li>This product corrects an issue where Fix BFD （Bidirectional Forwarding Detection）control failures in NSX environment.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8f4fd902230c4076905c23b7ab80bfdf" version="9ecb366ba659461fbff6020f9b9e2d38" lucid_version="i40ea.w2k22@1.18.367.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.18.367.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.16.208.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product enhanced the compatibility with firmware of FVL9.2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a9e8e46bd6de460ea736a9be4499f26a" version="7edb9e57107443ecbe3f96b2b52beacd" lucid_version="MB008000JWRTD_ESXi@HPD2(D)-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 8.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d04d5f721c2f4e7798db0b91a4b31687" version="f647269113bd447da8ee576deebb9368" lucid_version="U56.Linux@2.00_02-22-2024-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.00_02-22-2024" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.<br />
This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel&#39;s mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.&nbsp; This issue is not unique to HPE servers.<br />
Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.<br />
Addressed an issue where NVME hot plug when installing fully loaded NVME drives.<br />
Addressed a potential security vulnerability in some 3rd and 4th Generation Intel&reg; Xeon&reg; Processors when using Intel&reg; Software Guard Extensions (SGX) or Intel&reg; Trust Domain Extensions (TDX) may allow escalation of privilege, as documented in CVE-2023-22655.<br />
Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.<br />
Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.<br />
Addressed an issue where the iSCSI SW ipv6 HDD could not be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address Type.<br />
Addressed an issue where setup options of the BIOS Configuration (RBSU) utility may not be synchronized to the latest state when a server is idle in RBSU for more than 30 minutes.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00_02-22-2024" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhanced the SMBIOS type 203 ability for PCI device information displays that can support when the PCI slot is bifurcated.</p><p>Added an option of "Filter Non-bootable Drives" in RBSU Boot Options.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>This version of the System ROM should be paired with Server Platform Services (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the PCI VPD data would be written unconditionally while system is accessing to PCI VPD.</p><p>This revision of the System ROM includes the latest revision of the Intel IPU 2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763, CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability is documented in the CVE report site.  This issue is not unique to HPE servers.</p><p>Addressed an issue where the UBM version between RBSU and iLO web pages was not synchronized.</p><p>Addressed an issue where NVME hot plug when installing fully loaded NVME drives.</p><p>Addressed an issue vulnerabilities in network IP stack documented as from CVE-2023-45230 to CVE-2023-45237.</p><p>Addressed an issue where the PCIE slot control would disappear in RBSU when the PCIE switchboard is installed in the system.</p><p>Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI Configuration / Add an iSCSI Attempt > select Network device > IP Address Type.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1607ed48320345de80b2a91bfe782685" version="95887a2d389048f0a0a30e2bc10354fb" lucid_version="ixs.w2k22@4.1.252.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.252.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1.248.0 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which the component can&#39;t read the current driver version.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4a6c3482e88b43b192e573115d4e93dc" version="70075c9cea21430b856e62a9d923821d" lucid_version="mlnx_mft.rhel8u9.x86_64.rpm@4.26.1-3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.26.1-3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2232e2b621a84f55a544f2a4ed765213" version="6acc836dcc7543638096dadbed98d1bf" lucid_version="MK000480GZXRA_MK000960GZXRB_MK001920GZXRC_ESXi@HPG1-rev1__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4273bdba1b2e4a8c9b15a6a2a834ba78" version="dcfbd2b9e9624903a3a52cf88365f8ef" lucid_version="VO000960KWUEA_VO001920KWUEB_VO003840KWUEC_x64@HPK2(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK2" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for BIOS RSOD issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ae4ca58542c143b088e01d17c537b7ac" version="ba914a9098b0433090a1e6b6de2edfef" lucid_version="MB010000JYDKK_MB012000JYCJF_MB014000JYCJV_ESXi@HPD3__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Assert fixes, logging enhancements and all current firmware improvements and bug fixes.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes the logic bug in the media cache cleaning abort handling that caused the drive to choose and execute the R/W command before the Request Sense to prevent assert.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="182450d5bced417a85db3271254808a7" version="ab1ff461844f4087bc11aca20d7f913f" lucid_version="MM1000JEFRB_MM2000JEFRC_x64@HPDA(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDA" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.</li>
	<li>Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.</li>
	<li>Fix NVMe drive component which shows wrong behavior message against the flash result.</li>
	<li>Fix SPP force upgrade flash component problem on certain drive family.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDA (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f3f8a4081d78499e9a2dd9c8d9fb4059" version="88ab330573d844578722b0f42779ebe3" lucid_version="nicfwpkg_intel_e810_cq2@4.30__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="4.30" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp; ResetToDefault property(RDE Port Schema).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where InterfaceEnabled property is read only and it can&#39;t patch this property</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e5d8389759aa4832a8475a2ff763f16b" version="5acdf756044544e89502cdb620fb5356" lucid_version="VO000960JWZJF_VO001920JWZJH_VO003840JWZJK_x64@HPD5-rev1__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00136659en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6e4df08455db4ce3a3b07b6eecea6280" version="83c5d05930024f4ba2284b194d37cb9c" lucid_version="amsd_rhel9@3.5.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.5.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The RHEL9 AMS rpm is now FIPS compliant</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:&nbsp;</p>

<ul>
	<li>Fixed the issue where AMS was crashing after plugging and removing a USB drive</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.4.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The following enhancements are included in this release:</p>

<ul>
	<li>A warning&nbsp;and terminate&nbsp; amsd message is now displayed when&nbsp;system SW RAID is enabled</li>
	<li>Added &quot;support iLO6&quot; string to the description field of the amsd installation file</li>
	<li>Added ahslog service status to system log</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:&nbsp;</p>

<ul>
	<li>Added an error handling mechanism so that the ahslog service will no longer crash when there is no system package or the packet is NULL.</li>
	<li>Customers who use the snmpwalk command to query cpqSePciSlotWidth OID will see the correct data reported for all ports</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2e44a81a31b2430ba5be31f73e9e365e" version="71497595a599437eab41ce275373194b" lucid_version="MB006000GWBXQ_MB008000GWBYL_x64@HPG8(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Support firmware flash in OS FIPS enabled mode.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 9.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e79fad26938d4b788f99ac1b9d5aa529" version="262b6b0ce25447ebb700a8063cc2bd83" lucid_version="Apollo_2000_Gen10Plus.Win@1.27(C)__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.27" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Update build environment with SHA384</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.27 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added Win2022 support</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="45e5e3b4b5524afa8388b9297cf98327" version="151b45887af34cc5926d87bd368257dc" lucid_version="nmlx5_en.vmware70@2022.11.09(A)-rev1__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2022.11.09" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New features and changes in driver version 4.22.73.1004:</strong></p>

<ul>
	<li>Firmware CR dump will now be collected automatically into ZDUMP PSOD or on livedump for debuggability purposes.</li>
	<li>Enabled the driver to read the temperature from private statistics.</li>
</ul>

<p style="margin-left:40px">To see the temperature, run:# <em>nsxdp-cli ens uplink stats get -n vmnic1 | grep -i asicSensorTemperature</em></p>

<ul>
	<li>Added support for Hardware Accelerated GENEVE and VXLAN encapsulation and decapsulation for RoCE traffic.</li>
	<li>Hardware accelerated flows can now be mirrored using the standard packet capture tools.</li>
	<li>Added the ability to offload NSX Distributed Firewall rules by using in-hardware tracking of packet flows.</li>
	<li>RSS support for ENS Model 1 improves performance using fewer CPU cores. This capability can be enabled using the &quot;netq_rss_ens&quot; module parameter.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes&nbsp;included in driver version 4.22.73.1004</strong><strong>:</strong></p>

<ul>
	<li>Fixed an issue that caused a ParaVirtual VM to lose traffic after resuming from the suspend mode when SR-IOV was enabled in the system.</li>
	<li>Cleaned steering rule from FDB when VF is being quiesced.</li>
	<li>Fixed an issue that caused the driver to configure the incorrect SL value for RoCE with RDMACM.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2022.11.09 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New features and changes in driver version 4.22.73.1004:</strong></p>

<ul>
	<li>Firmware CR dump will now be collected automatically into ZDUMP PSOD or on livedump for debuggability purposes.</li>
	<li>Enabled the driver to read the temperature from private statistics.</li>
</ul>

<p style="margin-left:40px">To see the temperature, run:# <em>nsxdp-cli ens uplink stats get -n vmnic1 | grep -i asicSensorTemperature</em></p>

<ul>
	<li>Added support for Hardware Accelerated GENEVE and VXLAN encapsulation and decapsulation for RoCE traffic.</li>
	<li>Hardware accelerated flows can now be mirrored using the standard packet capture tools.</li>
	<li>Added the ability to offload NSX Distributed Firewall rules by using in-hardware tracking of packet flows.</li>
	<li>RSS support for ENS Model 1 improves performance using fewer CPU cores. This capability can be enabled using the &quot;netq_rss_ens&quot; module parameter.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes&nbsp;included in driver version 4.22.73.1004</strong><strong>:</strong></p>

<ul>
	<li>Fixed an issue that caused a ParaVirtual VM to lose traffic after resuming from the suspend mode when SR-IOV was enabled in the system.</li>
	<li>Cleaned steering rule from FDB when VF is being quiesced.</li>
	<li>Fixed an issue that caused the driver to configure the incorrect SL value for RoCE with RDMACM.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0d44f7068b8b4ccebd15e4e19fe5c5fa" version="b4526f6d80684f5580bb6b5b8ed6f83a" lucid_version="MO000400JWFWN_MO000800JWFWP_MO001600JWFWQ_x64@HPD5(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Server Windows 2022.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
  </revision_history>
</manifest>
