Skip to main content

UC-3100

MIL 1.1.0 for UC-3100 Series

OS Image VersionBuild No.Debian Ver.Kernel Ver.Release Date
v1.5220307139.13linux 4.4.285-cip63-rt36-moxa134/18/2022

Table of contents

  1. Moxa Package Change Log
  2. Debian Software Package Change Log
  3. Debian Security Patch
  4. Kernel Security Patch

Moxa Package Change Log

For detail change log of each package, refers to UC-3100 MIL 1.1 Change Log

PackageTypeVersionMajor Reason
moxa-auto-mountdAdd'1.1.0'Adds the moxa-auto-mountd package for configuring auto-mounting of USB devices and SD cardutility
linux-headers-4.4.0-cip-rt-moxa-am335xAdd'4.4.285-cip63-rt36-moxa13+deb9'Pre-install kernel header for building driver
linux-kbuild-4.4.0-cip-rt-moxa-am335xAdd'4.4.285-cip63-rt36-moxa13+deb9'Pre-install kbuild for building driver
moxa-mil-base-system-armhfAdd'1.0.0+deb9'Unified MIL configuration
moxa-mxio-libraryAdd'2.12.5+21032316+deb9'User-friendly I/O programming library to reduce development times and transfer operations in retrieving data from Moxa ioLogik E1200 Series
mxp-common-udev-rulesAdd'1.1.0'Update udev rule of Moxa platform
moxa-cellular-utilsUpgrade2.10.4' to '2.11.2'1. Cellular signal strength LED will now light up only when a connection to the Internet is available
2. Fix Telit cellular module gps_off return code
3. Fix connection failure issue when Verizon SIM card without IMS is used
moxa-cellular-signaldUpgrade2.10.4' to '2.11.2'Refers to moxa-cellular-utils
moxa-module-controlUpgrade'1.5.0' to '1.6.0'Improve error handling
moxa-msp340-bsl-scripterUpgrade'1.0.0' to '1.0.1'Remove superfluous message
moxa-versionUpgrade'1.1.0+deb9u2' to '1.2.0+deb9''The mx-ver utility now displays the Moxa Industrial Linux version utility
moxa-wifi-signaldUpgrade'1.8.6' to '1.8.9'Support additional Moxa computer models
moxa-wifi-utilsUpgrade'1.8.6' to '1.8.9'Support additional Moxa computer models
uc3100-base-systemUpgrade'1.10.3' to '1.12.5'1. Update minimum required version of packages
2. Fixed CPU frequency policy not work issue
uc3100-kernelUpgrade'4.4.190+1.1.8' to '4.4.285-cip63-rt36-moxa13+deb9'1. Support SPI flash Qual Read operation for s25fl164k
2. Adds the Moxa UPort driver for the UPort 1100/1200/1400/1600 Series
3. 'Fixed an issue where system reboot trigger by watchdog may result in kernel panic for UC-3111 and UC-3121
uc3100-modules-stdUpgrade'4.4.190+1.1.8' to '4.4.285-cip63-rt36-moxa13+deb9'Refers to uc3100-kernel
linux-headers-4.4.0-cip-rt-am335xRemove
linux-kbuild-4.4.0-cip-rt-am335xRemove
moxa-rfs-filesRemove

Debian Software Package Change Log

For detail change log of each package, refers to UC-3100 MIL 1.1 Change Log

PackageTypeVersion
libevent-2.0-5Add'2.0.21-stable-3'
libjansson4Add'2.9-1'
lldpdAdd'0.9.6-1'
snmpAdd'5.7.3+dfsg-1.7+deb9u3'
apache2Upgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
apache2-binUpgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
apache2-dataUpgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
apache2-utilsUpgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
aptUpgrade'1.4.10' to '1.4.11'
apt-utilsUpgrade'1.4.10' to '1.4.11'
bluezUpgrade'5.43-2+deb9u2' to '5.43-2+deb9u5'
busyboxUpgrade'1:1.22.0-19+b3' to '1:1.22.0-19+deb9u2'
ca-certificatesUpgrade'20200601~deb9u1' to '20200601~deb9u2'
cronUpgrade'3.0pl1-128+deb9u1' to '3.0pl1-128+deb9u2'
isc-dhcp-clientUpgrade'4.3.5-3+deb9u1' to '4.3.5-3+deb9u2'
isc-dhcp-commonUpgrade'4.3.5-3+deb9u1' to '4.3.5-3+deb9u2'
libapt-inst2.0Upgrade'1.4.10' to '1.4.11'
libapt-pkg5.0Upgrade'1.4.10' to '1.4.11'
libbsd0Upgrade'0.8.3-1' to '0.8.3-1+deb9u1'
libcurl3Upgrade'7.52.1-5+deb9u11' to '7.52.1-5+deb9u16'
libcurl3-gnutlsUpgrade'7.52.1-5+deb9u11' to '7.52.1-5+deb9u16'
libdns-export162Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u7' to '1:9.10.3.dfsg.P4-12.3+deb9u10'
libelf1Upgrade'0.168-1' to '0.168-1+deb9u1'
libgmp10Upgrade'2:6.1.2+dfsg-1' to '2:6.1.2+dfsg-1+deb9u1'
libgnutls30Upgrade'3.5.8-5+deb9u5' to '3.5.8-5+deb9u6'
libgssapi-krb5-2Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libhogweed4Upgrade'3.3-1+b2' to '3.3-1+deb9u1'
libicu57Upgrade'57.1-6+deb9u4' to '57.1-6+deb9u5'
libisc-export160Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u7' to '1:9.10.3.dfsg.P4-12.3+deb9u10'
libk5crypto3Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libkrb5-3Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libkrb5support0Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libldap-2.4-2Upgrade'2.4.44+dfsg-5+deb9u4' to '2.4.44+dfsg-5+deb9u8'
libldap-commonUpgrade'2.4.44+dfsg-5+deb9u4' to '2.4.44+dfsg-5+deb9u8'
liblz4-1Upgrade'0.0~r131-2+b1' to '0.0~r131-2+deb9u1'
libnettle6Upgrade'3.3-1+b2' to '3.3-1+deb9u1'
libnghttp2-14Upgrade'1.18.1-1+deb9u1' to '1.18.1-1+deb9u2'
libonig4Upgrade'6.1.3-2' to '6.1.3-2+deb9u2'
libp11-kit0Upgrade'0.23.3-2' to '0.23.3-2+deb9u1'
libpam-systemdUpgrade'232-25+deb9u12' to '232-25+deb9u13'
libpcap0.8Upgrade'1.8.1-3' to '1.8.1-3+deb9u1'
libsqlite3-0Upgrade'3.16.2-5+deb9u2' to '3.16.2-5+deb9u3'
libssh2-1Upgrade'1.7.0-1+deb9u1' to '1.7.0-1+deb9u2'
libssl1.0.2Upgrade'1.0.2u-1~deb9u1' to '1.0.2u-1~deb9u6'
libssl1.1Upgrade'1.1.0l-1~deb9u1' to '1.1.0l-1~deb9u4'
libsystemd0Upgrade'232-25+deb9u12' to '232-25+deb9u13'
libudev1Upgrade'232-25+deb9u12' to '232-25+deb9u13'
libudisks2-0Upgrade'2.1.8-1' to '2.1.8-1+deb9u1'
libxml2Upgrade'2.9.4+dfsg1-2.2+deb9u3' to '2.9.4+dfsg1-2.2+deb9u5'
loginUpgrade'1:4.4-4.1' to '1:4.4-4.1+deb9u1'
opensslUpgrade'1.1.0l-1~deb9u1' to '1.1.0l-1~deb9u4'
passwdUpgrade'1:4.4-4.1' to '1:4.4-4.1+deb9u1'
rsyslogUpgrade'8.24.0-1' to '8.24.0-1+deb9u1'
sudoUpgrade'1.8.19p1-2.1+deb9u2' to '1.8.19p1-2.1+deb9u3'
systemdUpgrade'232-25+deb9u12' to '232-25+deb9u13'
systemd-sysvUpgrade'232-25+deb9u12' to '232-25+deb9u13'
tarUpgrade'1.29b-1.1' to '1.29b-1.1+deb9u1'
tzdataUpgrade'2020a-0+deb9u1' to '2021a-0+deb9u2'
udevUpgrade'232-25+deb9u12' to '232-25+deb9u13'
udhcpcUpgrade'1:1.22.0-19+b3' to '1:1.22.0-19+deb9u2'
udisks2Upgrade'2.1.8-1' to '2.1.8-1+deb9u1'
wpasupplicantUpgrade'2:2.4-1+deb9u7' to '2:2.4-1+deb9u9'
ifenslaveRemove
ifenslave-2.6Remove
iperf3Remove
libiperf0Remove
libjson-c-devRemove
libtss2-udevRemove
read-edidRemove
tcpdumpRemove

Debian Security Patch

Refers to UC-3100 MIL 1.1 Change Log

Kernel Security Patch

Refer to below table for the list of kernel security patch

CVE-2015-8553CVE-2019-18806CVE-2020-13974CVE-2021-26932
CVE-2017-16644CVE-2019-19062CVE-2020-14305CVE-2021-27363
CVE-2017-18509CVE-2019-19066CVE-2020-14314CVE-2021-27364
CVE-2018-1000026CVE-2019-19068CVE-2020-14331CVE-2021-27365
CVE-2018-10323CVE-2019-19318CVE-2020-14351CVE-2021-28038
CVE-2018-13093CVE-2019-19319CVE-2020-14381CVE-2021-28964
CVE-2018-19407CVE-2019-19332CVE-2020-14390CVE-2021-28972
CVE-2018-20510CVE-2019-19447CVE-2020-14416CVE-2021-29650
CVE-2018-20836CVE-2019-19448CVE-2020-15393CVE-2021-30002
CVE-2018-20856CVE-2019-19523CVE-2020-15436CVE-2021-3178
CVE-2019-0154CVE-2019-19524CVE-2020-15437CVE-2021-31916
CVE-2019-10126CVE-2019-19525CVE-2020-16119CVE-2021-32399
CVE-2019-10142CVE-2019-19527CVE-2020-16166CVE-2021-33034
CVE-2019-10207CVE-2019-19528CVE-2020-1749CVE-2021-33909
CVE-2019-10220CVE-2019-19530CVE-2020-24490CVE-2021-3428
CVE-2019-10638CVE-2019-19531CVE-2020-24586CVE-2021-34693
CVE-2019-10639CVE-2019-19532CVE-2020-25211CVE-2021-3564
CVE-2019-11091CVE-2019-19533CVE-2020-25212CVE-2021-3573
CVE-2019-11135CVE-2019-19534CVE-2020-25285CVE-2021-3587
CVE-2019-11190CVE-2019-19535CVE-2020-25643CVE-2021-3609
CVE-2019-1125CVE-2019-19536CVE-2020-25645CVE-2021-3612
CVE-2019-11477CVE-2019-19537CVE-2020-25656CVE-2021-3653
CVE-2019-11478CVE-2019-19767CVE-2020-25668CVE-2021-3655
CVE-2019-11479CVE-2019-19768CVE-2020-25705CVE-2021-3659
CVE-2019-11486CVE-2019-19813CVE-2020-26088CVE-2021-3679
CVE-2019-11599CVE-2019-19816CVE-2020-26139CVE-2021-3715
CVE-2019-11810CVE-2019-19965CVE-2020-26147CVE-2021-3732
CVE-2019-11815CVE-2019-20054CVE-2020-26558CVE-2021-3753
CVE-2019-11833CVE-2019-20096CVE-2020-27066CVE-2021-37576
CVE-2019-11884CVE-2019-20636CVE-2020-27067CVE-2021-38160
CVE-2019-12818CVE-2019-20810CVE-2020-2732CVE-2021-38204
CVE-2019-12819CVE-2019-20812CVE-2020-27673CVE-2021-38205
CVE-2019-13272CVE-2019-2101CVE-2020-27675CVE-2021-38208
CVE-2019-14283CVE-2019-3459CVE-2020-27786CVE-2021-39634
CVE-2019-14284CVE-2019-3460CVE-2020-27815CVE-2021-39657
CVE-2019-14615CVE-2019-3846CVE-2020-27825CVE-2021-40490
CVE-2019-14814CVE-2019-3882CVE-2020-28097CVE-2021-4157
CVE-2019-14815CVE-2019-5108CVE-2020-28374CVE-2021-42008
CVE-2019-14816CVE-2019-5489CVE-2020-28915CVE-2021-45485
CVE-2019-14821CVE-2019-9213CVE-2020-28974CVE-2021-45486
CVE-2019-14835CVE-2019-9445CVE-2020-29370
CVE-2019-14895CVE-2019-9455CVE-2020-29371
CVE-2019-14896CVE-2019-9503CVE-2020-29568
CVE-2019-14897CVE-2019-9506CVE-2020-29660
CVE-2019-14901CVE-2020-0009CVE-2020-29661
CVE-2019-15212CVE-2020-0030CVE-2020-35508
CVE-2019-15214CVE-2020-0255CVE-2020-35519
CVE-2019-15216CVE-2020-0404CVE-2020-36312
CVE-2019-15218CVE-2020-0427CVE-2020-36386
CVE-2019-15219CVE-2020-0543CVE-2020-3702
CVE-2019-15239CVE-2020-10135CVE-2020-8428
CVE-2019-15292CVE-2020-10690CVE-2020-8647
CVE-2019-15666CVE-2020-10711CVE-2020-8648
CVE-2019-15807CVE-2020-10720CVE-2020-8649
CVE-2019-15916CVE-2020-10732CVE-2020-8694
CVE-2019-15917CVE-2020-10751CVE-2020-8992
CVE-2019-15926CVE-2020-10766CVE-2020-9383
CVE-2019-16413CVE-2020-10767CVE-2021-0129
CVE-2019-16746CVE-2020-10768CVE-2021-0447
CVE-2019-16995CVE-2020-10942CVE-2021-0448
CVE-2019-17052CVE-2020-11565CVE-2021-0512
CVE-2019-17053CVE-2020-12352CVE-2021-0920
CVE-2019-17054CVE-2020-12464CVE-2021-0937
CVE-2019-17055CVE-2020-12652CVE-2021-1048
CVE-2019-17056CVE-2020-12656CVE-2021-20261
CVE-2019-17133CVE-2020-12769CVE-2021-21781
CVE-2019-17351CVE-2020-12770CVE-2021-22555
CVE-2019-18282CVE-2020-12771CVE-2021-23133
CVE-2019-18660CVE-2020-12826CVE-2021-23134
CVE-2019-18805CVE-2020-13143CVE-2021-26931

Last updated on 2022-04-29 by george.hsiao