Skip to main content

UC-5100

MIL 1.1.0 for UC-5100 Series

OS Image VersionBuild No.Debian Ver.Kernel Ver.Release Date
v1.4220301189.13linux 4.4.285-cip63-rt36-moxa114/18/2022

Table of contents

  1. Moxa Package Change Log
  2. Debian Software Package Change Log
  3. Debian Security Patch
  4. Kernel Security Patch

Moxa Package Change Log

For detail change log of each package, refers to UC-5100 MIL 1.1 Change Log

PackageTypeVersionMajor Reason
moxa-auto-mountdAdd'1.1.0'Adds the moxa-auto-mountd package for configuring auto-mounting of USB devices and SD card utility
moxa-mxio-libraryAdd'2.12.5+21032316+deb9'User-friendly I/O programming library to reduce development times and transfer operations in retrieving data from Moxa ioLogik E1200 Series
linux-headers-4.4.0-cip-rt-moxa-am335xAdd'4.4.285-cip63-rt36-moxa11+deb9'Pre-install kernel header for building driver
linux-kbuild-4.4.0-cip-rt-moxa-am335xAdd'4.4.285-cip63-rt36-moxa11+deb9'Pre-install kbuild for building driver
moxa-mil-base-system-armhfAdd'1.0.0+deb9'Unified MIL configuration
sparklan-qca9377-driver-4.4.0-cip-rt-moxa-am335xAdd'4.4.285-cip63-rt36-moxa11+deb9'Update SparkLAN Wi-Fi driver dependent kernel version
moxa-cellular-utilsUpgrade'2.10.4' to '2.11.2'1. Display signal strength LED only if connection to internet is available
2. Fix Telit cellular module gps_off return code
moxa-cellular-signaldUpgrade'2.10.4' to '2.11.2'Refers to moxa-cellular-utils
moxa-versionUpgrade'1.1.0+deb9' to '1.2.0+deb9'The mx-ver utility now displays the Moxa Industrial Linux version
moxa-wifi-signaldUpgrade'1.8.6' to '1.8.8'Support additional Moxa computer models
moxa-wifi-utilsUpgrade'1.8.6' to '1.8.8'Support additional Moxa computer models
mxp-common-udev-rulesUpgrade'1.0.2' to '1.1.0'Update udev rule of Moxa platform
uc5100-base-systemUpgrade'1.3.2' to '1.4.3'Update minimum required version of packages
uc5100-kernelUpgrade'4.4.190+1.1.6' to '4.4.285-cip63-rt36-moxa11+deb9'1. Support SPI flash Qual Read operation for s25fl164k2.
2. Adds the Moxa UPort driver for the UPort 1100/1200/1400/1600 Series
uc5100-modules-stdUpgrade'4.4.190+1.1.6' to '4.4.285-cip63-rt36-moxa11+deb9'Refers to uc5100-kernel
moxa-rfs-filesRemove
moxa-security-utilsRemove
linux-headers-4.4.0-cip-rt-am335xRemove
linux-kbuild-4.4.0-cip-rt-am335xRemove

Debian Software Package Change Log

For detail change log of each package, refers to UC-5100 MIL 1.1 Change Log

PackageTypeVersion
libcurl3Add'7.52.1-5+deb9u16'
libevent-2.0-5Add'2.0.21-stable-3'
libjansson4Add'2.9-1'
lldpdAdd'0.9.6-1'
snmpAdd'5.7.3+dfsg-1.7+deb9u3'
apache2Upgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
apache2-binUpgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
apache2-dataUpgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
apache2-utilsUpgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
aptUpgrade'1.4.10' to '1.4.11'
apt-utilsUpgrade'1.4.10' to '1.4.11'
busyboxUpgrade'1:1.22.0-19+b3' to '1:1.22.0-19+deb9u2'
ca-certificatesUpgrade'20200601~deb9u1' to '20200601~deb9u2'
cronUpgrade'3.0pl1-128+deb9u1' to '3.0pl1-128+deb9u2'
e2fslibsUpgrade'1.43.4-2+deb9u1' to '1.43.4-2+deb9u2'
e2fsprogsUpgrade'1.43.4-2+deb9u1' to '1.43.4-2+deb9u2'
isc-dhcp-clientUpgrade'4.3.5-3+deb9u1' to '4.3.5-3+deb9u2'
isc-dhcp-commonUpgrade'4.3.5-3+deb9u1' to '4.3.5-3+deb9u2'
libapt-inst2.0Upgrade'1.4.10' to '1.4.11'
libapt-pkg5.0Upgrade'1.4.10' to '1.4.11'
libbsd0Upgrade'0.8.3-1' to '0.8.3-1+deb9u1'
libcomerr2Upgrade'1.43.4-2+deb9u1' to '1.43.4-2+deb9u2'
libcurl3-gnutlsUpgrade'7.52.1-5+deb9u10' to '7.52.1-5+deb9u16'
libdns-export162Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u6' to '1:9.10.3.dfsg.P4-12.3+deb9u10'
libelf1Upgrade'0.168-1' to '0.168-1+deb9u1'
libgmp10Upgrade'2:6.1.2+dfsg-1' to '2:6.1.2+dfsg-1+deb9u1'
libgnutls30Upgrade'3.5.8-5+deb9u5' to '3.5.8-5+deb9u6'
libgssapi-krb5-2Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libhogweed4Upgrade'3.3-1+b2' to '3.3-1+deb9u1'
libicu57Upgrade'57.1-6+deb9u4' to '57.1-6+deb9u5'
libisc-export160Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u6' to '1:9.10.3.dfsg.P4-12.3+deb9u10'
libjson-c3Upgrade'0.12.1-1.1' to '0.12.1-1.1+deb9u1'
libk5crypto3Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libkrb5-3Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libkrb5support0Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libldap-2.4-2Upgrade'2.4.44+dfsg-5+deb9u4' to '2.4.44+dfsg-5+deb9u8'
libldap-commonUpgrade'2.4.44+dfsg-5+deb9u4' to '2.4.44+dfsg-5+deb9u8'
liblz4-1Upgrade'0.0~r131-2+b1' to '0.0~r131-2+deb9u1'
libnettle6Upgrade'3.3-1+b2' to '3.3-1+deb9u1'
libnghttp2-14Upgrade'1.18.1-1+deb9u1' to '1.18.1-1+deb9u2'
libonig4Upgrade'6.1.3-2' to '6.1.3-2+deb9u2'
libp11-kit0Upgrade'0.23.3-2' to '0.23.3-2+deb9u1'
libpam-systemdUpgrade'232-25+deb9u12' to '232-25+deb9u13'
libpcap0.8Upgrade'1.8.1-3' to '1.8.1-3+deb9u1'
libsnmp-baseUpgrade'5.7.3+dfsg-1.7+deb9u1' to '5.7.3+dfsg-1.7+deb9u3'
libsnmp30Upgrade'5.7.3+dfsg-1.7+deb9u1' to '5.7.3+dfsg-1.7+deb9u3'
libsqlite3-0Upgrade'3.16.2-5+deb9u1' to '3.16.2-5+deb9u3'
libss2Upgrade'1.43.4-2+deb9u1' to '1.43.4-2+deb9u2'
libssh2-1Upgrade'1.7.0-1+deb9u1' to '1.7.0-1+deb9u2'
libssl1.0.2Upgrade'1.0.2u-1~deb9u1' to '1.0.2u-1~deb9u6'
libssl1.1Upgrade'1.1.0l-1~deb9u1' to '1.1.0l-1~deb9u4'
libsystemd0Upgrade'232-25+deb9u12' to '232-25+deb9u13'
libtss2-esys0Upgrade'2.1.0-2' to '2.4.0-1-moxa1'
libudev1Upgrade'232-25+deb9u12' to '232-25+deb9u13'
libudisks2-0Upgrade'2.1.8-1' to '2.1.8-1+deb9u1'
libxml2Upgrade'2.9.4+dfsg1-2.2+deb9u2' to '2.9.4+dfsg1-2.2+deb9u5'
loginUpgrade'1:4.4-4.1' to '1:4.4-4.1+deb9u1'
opensslUpgrade'1.1.0l-1~deb9u1' to '1.1.0l-1~deb9u4'
passwdUpgrade'1:4.4-4.1' to '1:4.4-4.1+deb9u1'
rsyslogUpgrade'8.24.0-1' to '8.24.0-1+deb9u1'
snmpdUpgrade'5.7.3+dfsg-1.7+deb9u1' to '5.7.3+dfsg-1.7+deb9u3'
sudoUpgrade'1.8.19p1-2.1+deb9u2' to '1.8.19p1-2.1+deb9u3'
systemdUpgrade'232-25+deb9u12' to '232-25+deb9u13'
systemd-sysvUpgrade'232-25+deb9u12' to '232-25+deb9u13'
tarUpgrade'1.29b-1.1' to '1.29b-1.1+deb9u1'
tpm2-toolsUpgrade'3.1.3-2' to '4.1.1-1-moxa1'
tzdataUpgrade'2020a-0+deb9u1' to '2021a-0+deb9u2'
udevUpgrade'232-25+deb9u12' to '232-25+deb9u13'
udhcpcUpgrade'1:1.22.0-19+b3' to '1:1.22.0-19+deb9u2'
udisks2Upgrade'2.1.8-1' to '2.1.8-1+deb9u1'
wpasupplicantUpgrade'2:2.4-1+deb9u6' to '2:2.4-1+deb9u9'
bridge-utilsRemove
bzip2Remove
device-tree-compilerRemove
dosfstoolsRemove
exfat-fuseRemove
exfat-utilsRemove
fileRemove
fuseRemove
ifenslaveRemove
ifenslave-2.6Remove
iperf3Remove
libfuse2Remove
libiperf0Remove
libjson-c-devRemove
libmagic-mgcRemove
libmagic1Remove
libpolkit-backend-1-0Remove
libtss2-udevRemove
ncurses-termRemove
policykit-1Remove
sparklan-qca9377-driver-4.4.0-cip-am335xRemove
tcpdRemove
tcpdumpRemove
xz-utilsRemove

Debian Security Patch

Refers to UC-5100 MIL 1.1 Change Log

Kernel Security Patch

Refer to below table for the list of kernel security patch

CVE-2015-8553CVE-2019-18806CVE-2020-13974CVE-2021-26932
CVE-2017-16644CVE-2019-19062CVE-2020-14305CVE-2021-27363
CVE-2017-18509CVE-2019-19066CVE-2020-14314CVE-2021-27364
CVE-2018-1000026CVE-2019-19068CVE-2020-14331CVE-2021-27365
CVE-2018-10323CVE-2019-19318CVE-2020-14351CVE-2021-28038
CVE-2018-13093CVE-2019-19319CVE-2020-14381CVE-2021-28964
CVE-2018-19407CVE-2019-19332CVE-2020-14390CVE-2021-28972
CVE-2018-20510CVE-2019-19447CVE-2020-14416CVE-2021-29650
CVE-2018-20836CVE-2019-19448CVE-2020-15393CVE-2021-30002
CVE-2018-20856CVE-2019-19523CVE-2020-15436CVE-2021-3178
CVE-2019-0154CVE-2019-19524CVE-2020-15437CVE-2021-31916
CVE-2019-10126CVE-2019-19525CVE-2020-16119CVE-2021-32399
CVE-2019-10142CVE-2019-19527CVE-2020-16166CVE-2021-33034
CVE-2019-10207CVE-2019-19528CVE-2020-1749CVE-2021-33909
CVE-2019-10220CVE-2019-19530CVE-2020-24490CVE-2021-3428
CVE-2019-10638CVE-2019-19531CVE-2020-24586CVE-2021-34693
CVE-2019-10639CVE-2019-19532CVE-2020-25211CVE-2021-3564
CVE-2019-11091CVE-2019-19533CVE-2020-25212CVE-2021-3573
CVE-2019-11135CVE-2019-19534CVE-2020-25285CVE-2021-3587
CVE-2019-11190CVE-2019-19535CVE-2020-25643CVE-2021-3609
CVE-2019-1125CVE-2019-19536CVE-2020-25645CVE-2021-3612
CVE-2019-11477CVE-2019-19537CVE-2020-25656CVE-2021-3653
CVE-2019-11478CVE-2019-19767CVE-2020-25668CVE-2021-3655
CVE-2019-11479CVE-2019-19768CVE-2020-25705CVE-2021-3659
CVE-2019-11486CVE-2019-19813CVE-2020-26088CVE-2021-3679
CVE-2019-11599CVE-2019-19816CVE-2020-26139CVE-2021-3715
CVE-2019-11810CVE-2019-19965CVE-2020-26147CVE-2021-3732
CVE-2019-11815CVE-2019-20054CVE-2020-26558CVE-2021-3753
CVE-2019-11833CVE-2019-20096CVE-2020-27066CVE-2021-37576
CVE-2019-11884CVE-2019-20636CVE-2020-27067CVE-2021-38160
CVE-2019-12818CVE-2019-20810CVE-2020-2732CVE-2021-38204
CVE-2019-12819CVE-2019-20812CVE-2020-27673CVE-2021-38205
CVE-2019-13272CVE-2019-2101CVE-2020-27675CVE-2021-38208
CVE-2019-14283CVE-2019-3459CVE-2020-27786CVE-2021-39634
CVE-2019-14284CVE-2019-3460CVE-2020-27815CVE-2021-39657
CVE-2019-14615CVE-2019-3846CVE-2020-27825CVE-2021-40490
CVE-2019-14814CVE-2019-3882CVE-2020-28097CVE-2021-4157
CVE-2019-14815CVE-2019-5108CVE-2020-28374CVE-2021-42008
CVE-2019-14816CVE-2019-5489CVE-2020-28915CVE-2021-45485
CVE-2019-14821CVE-2019-9213CVE-2020-28974CVE-2021-45486
CVE-2019-14835CVE-2019-9445CVE-2020-29370
CVE-2019-14895CVE-2019-9455CVE-2020-29371
CVE-2019-14896CVE-2019-9503CVE-2020-29568
CVE-2019-14897CVE-2019-9506CVE-2020-29660
CVE-2019-14901CVE-2020-0009CVE-2020-29661
CVE-2019-15212CVE-2020-0030CVE-2020-35508
CVE-2019-15214CVE-2020-0255CVE-2020-35519
CVE-2019-15216CVE-2020-0404CVE-2020-36312
CVE-2019-15218CVE-2020-0427CVE-2020-36386
CVE-2019-15219CVE-2020-0543CVE-2020-3702
CVE-2019-15239CVE-2020-10135CVE-2020-8428
CVE-2019-15292CVE-2020-10690CVE-2020-8647
CVE-2019-15666CVE-2020-10711CVE-2020-8648
CVE-2019-15807CVE-2020-10720CVE-2020-8649
CVE-2019-15916CVE-2020-10732CVE-2020-8694
CVE-2019-15917CVE-2020-10751CVE-2020-8992
CVE-2019-15926CVE-2020-10766CVE-2020-9383
CVE-2019-16413CVE-2020-10767CVE-2021-0129
CVE-2019-16746CVE-2020-10768CVE-2021-0447
CVE-2019-16995CVE-2020-10942CVE-2021-0448
CVE-2019-17052CVE-2020-11565CVE-2021-0512
CVE-2019-17053CVE-2020-12352CVE-2021-0920
CVE-2019-17054CVE-2020-12464CVE-2021-0937
CVE-2019-17055CVE-2020-12652CVE-2021-1048
CVE-2019-17056CVE-2020-12656CVE-2021-20261
CVE-2019-17133CVE-2020-12769CVE-2021-21781
CVE-2019-17351CVE-2020-12770CVE-2021-22555
CVE-2019-18282CVE-2020-12771CVE-2021-23133
CVE-2019-18660CVE-2020-12826CVE-2021-23134
CVE-2019-18805CVE-2020-13143CVE-2021-26931

Last updated on 2022-04-29 by george.hsiao