Global Technical Service Europe Technical Service

Inspur’s Solution Announcement for the “Meltdown” and “Spectre” Security Exploits


  1. Security Leakage introduction

  On January 3, 2018, security researchers disclosed two security leakages named “Meltdown” (CVE#: CVE-2017-5754) and “Spectre” (CVE#: CVE-2017-5753 and CVE#: CVE-2017-5715). Many computing devices are susceptible to both exploits and hackers may be able to use the exploits to get access to computing processes or to OS kernel’s sensitive data beyond their privilege.

  Inspur is working closely with Chip vendors and industry partners to develop prompt solutions to resolve these issues. We will provide updated announcements frequently based on our progress.

  2. Recommended solution

CVE-2017-5754(Rogue data cache load) solution

  - Need OS patch, see more detail on chapter 3.

CVE-2017-5753(Bounds check bypass)solution

  - Need OS patch, see more detail on chapter 3.

CVE-2017-5715(Branch target injection)solution

  - Need update both OS patch and CPU Microcode.

  3. Download and update OS patches

  Now Microsoft, Redhat, SUSE and Vmware have Released OS patches to fix the security leakage, Inspur strongly advice customer update OS patches following OS vendor’s security Advisory. Below listed related security Advisory link.

      1.  Microsoft security update Advisory


      2.  RedHat security update Advisory


      3. Vmware security update Advisory


      4.Suse security update Advisory

  4.  Download and update CPU Microcode

  Inspur provide the following two methods to update CPU Microcode.

       1. Solution 1: Download  the OS based Microcode update toolset and do the update in OS environment. This solution doesn’t need reset the system to take effect, It’s more convenient and stable to operate.

This toolset support all the inspur server product with the following processor family.

Intel Xeon E5 V3 Series Processor

Intel Xeon E5 V4 Series Processor

Intel Xeon E7 V3 Series Processor

Intel Xeon Scalable Series Processor

This toolset support OS include:

RedHat Enterprise Linux 6.x/7.x

MicroSoft Windows Server 2012/2016

SUSE Linux Enterprise Server 11.2/11.3

Vmware 5.5/6.0/6.5

       2. Solution 2: Inspur provides method to update CPU Microcode of its various products as mentioned in the table below. Download your product’s corresponding BIOS image and perform the BIOS upgrade; new microcode will take effect in the next system reboot. The affected products and corresponding fix versions are listed in the table below.

  Note: BIOS update needs to meet the corresponding BMC requirement, and customer may have to update BMC Firmware in the meantime.

       5. Releated web link

   1. Intel released new

   2. Intel security Advisory

   3. Google Security blog

   4. Research from Google Project Zero

   5. Third-party research

   6. Microsoft security update Advisory

   7. RedHat security update Advisory

       6. Release history






Initial release





Inspur Group Core Values Partners News Events


Download Center Service & Warranty
  • E-Waste Collection Service

    Where to buy


    Contact Us Join Us


    Facebook Instagram Twitter

    Copyright © 2018 Inspur. All Rights Reserved.

    inspur logo
    • Support:


    • Sales Inquiries: