Intel Q2 Security Update on Side-Channel Analysis Method Vulnerability

Fujitsu Advisory note: Intel vulnerabilities affecting selected PRIMERGY, PRIMEQUEST and Client Computing Devices

Intel has identified and made public today a new vulnerability affecting modern processor architectures. This new vulnerability is a derivative of the side-channel methods previously disclosed in January.

Please be aware that selected FUJITSU Server PRIMERGY/ PRIMEQUEST systems and CCD Products are affected by these vulnerabilities.

Fujitsu is working closely with Intel to address the issue through the release of software patches for all affected products that are currently supported. Older systems that are no longer supported will not be patched.

Fujitsu has published an advisory note on its support website which:

– Describes the vulnerability and the recommended steps as advised by Fujitsu to patch affected product lines
– Provides a list of affected systems and products here and patch availability. Fujitsu will update this list regularly.

Please advise customers with affected systems to follow these recommendations.

https://sp.ts.fujitsu.com/dmsp/Publications/public/Intel%20Side-Channel-Analysis-Method-Spectre-NG-SA-00115-List-Fujitsu-Products.pdf