Skip to main content

UC-8410A

MIL 1.1.0 for UC-8410A Series

OS Image VersionBuild No.Debian Ver.Kernel Ver.Release Date
v4.1.2220302179.13linux 4.4.285-cip63-rt36-moxa84/18/2022

Table of contents

  1. Moxa Package Change Log
  2. Debian Software Package Change Log
  3. Debian Security Patch
  4. Kernel Security Patch

Moxa Package Change Log

For detail change log of each package, refers to UC-8410A MIL 1.1 Change Log

PackageTypeVersionMajor Reason
moxa-auto-mountdAdd'1.1.0'Adds the moxa-auto-mountd package for configuring auto-mounting of USB devices and SD card
moxa-mxio-libraryAdd'2.12.5+21032316+deb9'User-friendly I/O programming library to reduce development times and transfer operations in retrieving data from Moxa ioLogik E1200 Series
moxa-mil-base-system-armhfAdd'1.0.0+deb9'Unified MIL configuration
linux-headers-4.4.0-cip-rt-moxa-ls102xaUpgrade'4.4.201+1.1.6+deb9' to '4.4.285-cip63-rt36-moxa8+deb9'Pre-install kernel header for building driver
linux-kbuild-4.4.0-cip-rt-moxa-ls102xaUpgrade'4.4.201+1.1.6+deb9' to '4.4.285-cip63-rt36-moxa8+deb9'Pre-install kbuild for building driver
moxa-cellular-utilsUpgrade'2.10.5' to '2.11.1'Display signal strength LED only if connection to internet is available
moxa-cellular-signaldUpgrade'2.10.5' to '2.11.1'Refers to moxa-cellular-utils
moxa-versionUpgrade'1.1.0+deb9u2' to '1.2.0+deb9'The mx-ver utility now displays the Moxa Industrial Linux version
moxa-wifi-signaldUpgrade'1.8.6' to '1.8.8'Support additional Moxa computer models
moxa-wifi-utilsUpgrade'1.8.6' to '1.8.8'Refers to moxa-wifi-signald
mxp-common-udev-rulesUpgrade'1.0.3' to '1.1.0'Update udev rule of Moxa platform
uc8410a-base-systemUpgrade'1.2.1+deb9' to '1.4.1'Update minimum required version of packages
uc8410a-kernelUpgrade'4.4.201+1.1.6+deb9' to '4.4.285-cip63-rt36-moxa8+deb9'Adds the Moxa UPort driver for the UPort 1100/1200/1400/1600 Series Driver
uc8410a-modulesUpgrade'4.4.201+1.1.6+deb9' to '4.4.285-cip63-rt36-moxa8+deb9'Refers to uc8410a-kernel
uc8410a-setinterfaceUpgrade'1.2.1+deb9' to '1.4.0'Update minimum required version of packages
uc8410a-t2Upgrade'1.2.1+deb9' to '1.4.0'Update minimum required version of packages
moxa-nport-real-tty-utilsUpgrade1.19+1.0.0+chn1' to '1.19+1.0.0'Update driver from CV to generic version
cryptodev-linux-4.4.0-cip-rt-moxa-ls102xaRemove
moxa-nport-real-tty-driver-4.4.0-cip-rt-moxa-ls102xaRemove
moxa-rfs-filesRemove

Debian Software Package Change Log

For detail change log of each package, refers to UC-8410A MIL 1.1 Change Log

PackageTypeVersion
libevent-2.0-5Add'2.0.21-stable-3'
libjansson4Add'2.9-1'
libtss2-esys0Add'2.4.0-1-moxa1'
lldpdAdd'0.9.6-1'
tpm2-toolsAdd'4.1.1-1-moxa1'
apache2Upgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
apache2-binUpgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
apache2-dataUpgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
apache2-utilsUpgrade'2.4.25-3+deb9u9' to '2.4.25-3+deb9u11'
aptUpgrade'1.4.10' to '1.4.11'
apt-utilsUpgrade'1.4.10' to '1.4.11'
busyboxUpgrade'1:1.22.0-19+b3' to '1:1.22.0-19+deb9u2'
ca-certificatesUpgrade'20200601~deb9u1' to '20200601~deb9u2'
cronUpgrade'3.0pl1-128+deb9u1' to '3.0pl1-128+deb9u2'
e2fslibsUpgrade'1.43.4-2+deb9u1' to '1.43.4-2+deb9u2'
e2fsprogsUpgrade'1.43.4-2+deb9u1' to '1.43.4-2+deb9u2'
isc-dhcp-clientUpgrade'4.3.5-3+deb9u1' to '4.3.5-3+deb9u2'
isc-dhcp-commonUpgrade'4.3.5-3+deb9u1' to '4.3.5-3+deb9u2'
libapt-inst2.0Upgrade'1.4.10' to '1.4.11'
libapt-pkg5.0Upgrade'1.4.10' to '1.4.11'
libbsd0Upgrade'0.8.3-1' to '0.8.3-1+deb9u1'
libcomerr2Upgrade'1.43.4-2+deb9u1' to '1.43.4-2+deb9u2'
libcurl3Upgrade'7.52.1-5+deb9u10' to '7.52.1-5+deb9u16'
libcurl3-gnutlsUpgrade'7.52.1-5+deb9u10' to '7.52.1-5+deb9u16'
libdns-export162Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u6' to '1:9.10.3.dfsg.P4-12.3+deb9u10'
libelf1Upgrade'0.168-1' to '0.168-1+deb9u1'
libgmp10Upgrade'2:6.1.2+dfsg-1' to '2:6.1.2+dfsg-1+deb9u1'
libgnutls30Upgrade'3.5.8-5+deb9u5' to '3.5.8-5+deb9u6'
libgssapi-krb5-2Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libhogweed4Upgrade'3.3-1+b2' to '3.3-1+deb9u1'
libicu57Upgrade'57.1-6+deb9u4' to '57.1-6+deb9u5'
libisc-export160Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u6' to '1:9.10.3.dfsg.P4-12.3+deb9u10'
libjson-c3Upgrade'0.12.1-1.1' to '0.12.1-1.1+deb9u1'
libk5crypto3Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libkrb5-3Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libkrb5support0Upgrade'1.15-1+deb9u1' to '1.15-1+deb9u3'
libldap-2.4-2Upgrade'2.4.44+dfsg-5+deb9u4' to '2.4.44+dfsg-5+deb9u8'
libldap-commonUpgrade'2.4.44+dfsg-5+deb9u4' to '2.4.44+dfsg-5+deb9u8'
liblz4-1Upgrade'0.0~r131-2+b1' to '0.0~r131-2+deb9u1'
libnettle6Upgrade'3.3-1+b2' to '3.3-1+deb9u1'
libnghttp2-14Upgrade'1.18.1-1+deb9u1' to '1.18.1-1+deb9u2'
libonig4Upgrade'6.1.3-2' to '6.1.3-2+deb9u2'
libp11-kit0Upgrade'0.23.3-2' to '0.23.3-2+deb9u1'
libpam-systemdUpgrade'232-25+deb9u12' to '232-25+deb9u13'
libpcap0.8Upgrade'1.8.1-3' to '1.8.1-3+deb9u1'
libsnmp-baseUpgrade'5.7.3+dfsg-1.7+deb9u1' to '5.7.3+dfsg-1.7+deb9u3'
libsnmp30Upgrade'5.7.3+dfsg-1.7+deb9u1' to '5.7.3+dfsg-1.7+deb9u3'
libsqlite3-0Upgrade'3.16.2-5+deb9u1' to '3.16.2-5+deb9u3'
libss2Upgrade'1.43.4-2+deb9u1' to '1.43.4-2+deb9u2'
libssh2-1Upgrade'1.7.0-1+deb9u1' to '1.7.0-1+deb9u2'
libssl1.0.2Upgrade'1.0.2u-1~deb9u1' to '1.0.2u-1~deb9u6'
libssl1.1Upgrade'1.1.0l-1~deb9u1' to '1.1.0l-1~deb9u4'
libsystemd0Upgrade'232-25+deb9u12' to '232-25+deb9u13'
libudev1Upgrade'232-25+deb9u12' to '232-25+deb9u13'
libudisks2-0Upgrade'2.1.8-1' to '2.1.8-1+deb9u1'
libxml2Upgrade'2.9.4+dfsg1-2.2+deb9u2' to '2.9.4+dfsg1-2.2+deb9u5'
loginUpgrade'1:4.4-4.1' to '1:4.4-4.1+deb9u1'
opensslUpgrade'1.1.0l-1~deb9u1' to '1.1.0l-1~deb9u4'
passwdUpgrade'1:4.4-4.1' to '1:4.4-4.1+deb9u1'
rsyslogUpgrade'8.24.0-1' to '8.24.0-1+deb9u1'
snmpUpgrade'5.7.3+dfsg-1.7+deb9u1' to '5.7.3+dfsg-1.7+deb9u3'
snmpdUpgrade'5.7.3+dfsg-1.7+deb9u1' to '5.7.3+dfsg-1.7+deb9u3'
sudoUpgrade'1.8.19p1-2.1+deb9u2' to '1.8.19p1-2.1+deb9u3'
systemdUpgrade'232-25+deb9u12' to '232-25+deb9u13'
systemd-sysvUpgrade'232-25+deb9u12' to '232-25+deb9u13'
tarUpgrade'1.29b-1.1' to '1.29b-1.1+deb9u1'
tzdataUpgrade'2020a-0+deb9u1' to '2021a-0+deb9u2'
udevUpgrade'232-25+deb9u12' to '232-25+deb9u13'
udhcpcUpgrade'1:1.22.0-19+b3' to '1:1.22.0-19+deb9u2'
udisks2Upgrade'2.1.8-1' to '2.1.8-1+deb9u1'
wpasupplicantUpgrade'2:2.4-1+deb9u6' to '2:2.4-1+deb9u9'
beepRemove
bridge-utilsRemove
can-utilsRemove
curlRemove
firmware-atherosRemove
ifenslaveRemove
ifenslave-2.6Remove
iperf3Remove
libiperf0Remove
libjson-c-devRemove
libsapi-utilsRemove
libsapi0Remove
tcpdumpRemove

Debian Security Patch

Refers to UC-8410A MIL 1.1 Change Log

Kernel Security Patch

Refer to below table for the list of kernel security patch

CVE-2015-8553CVE-2019-18806CVE-2020-13974CVE-2021-26932
CVE-2017-16644CVE-2019-19062CVE-2020-14305CVE-2021-27363
CVE-2017-18509CVE-2019-19066CVE-2020-14314CVE-2021-27364
CVE-2018-1000026CVE-2019-19068CVE-2020-14331CVE-2021-27365
CVE-2018-10323CVE-2019-19318CVE-2020-14351CVE-2021-28038
CVE-2018-13093CVE-2019-19319CVE-2020-14381CVE-2021-28964
CVE-2018-19407CVE-2019-19332CVE-2020-14390CVE-2021-28972
CVE-2018-20510CVE-2019-19447CVE-2020-14416CVE-2021-29650
CVE-2018-20836CVE-2019-19448CVE-2020-15393CVE-2021-30002
CVE-2018-20856CVE-2019-19523CVE-2020-15436CVE-2021-3178
CVE-2019-0154CVE-2019-19524CVE-2020-15437CVE-2021-31916
CVE-2019-10126CVE-2019-19525CVE-2020-16119CVE-2021-32399
CVE-2019-10142CVE-2019-19527CVE-2020-16166CVE-2021-33034
CVE-2019-10207CVE-2019-19528CVE-2020-1749CVE-2021-33909
CVE-2019-10220CVE-2019-19530CVE-2020-24490CVE-2021-3428
CVE-2019-10638CVE-2019-19531CVE-2020-24586CVE-2021-34693
CVE-2019-10639CVE-2019-19532CVE-2020-25211CVE-2021-3564
CVE-2019-11091CVE-2019-19533CVE-2020-25212CVE-2021-3573
CVE-2019-11135CVE-2019-19534CVE-2020-25285CVE-2021-3587
CVE-2019-11190CVE-2019-19535CVE-2020-25643CVE-2021-3609
CVE-2019-1125CVE-2019-19536CVE-2020-25645CVE-2021-3612
CVE-2019-11477CVE-2019-19537CVE-2020-25656CVE-2021-3653
CVE-2019-11478CVE-2019-19767CVE-2020-25668CVE-2021-3655
CVE-2019-11479CVE-2019-19768CVE-2020-25705CVE-2021-3659
CVE-2019-11486CVE-2019-19813CVE-2020-26088CVE-2021-3679
CVE-2019-11599CVE-2019-19816CVE-2020-26139CVE-2021-3715
CVE-2019-11810CVE-2019-19965CVE-2020-26147CVE-2021-3732
CVE-2019-11815CVE-2019-20054CVE-2020-26558CVE-2021-3753
CVE-2019-11833CVE-2019-20096CVE-2020-27066CVE-2021-37576
CVE-2019-11884CVE-2019-20636CVE-2020-27067CVE-2021-38160
CVE-2019-12818CVE-2019-20810CVE-2020-2732CVE-2021-38204
CVE-2019-12819CVE-2019-20812CVE-2020-27673CVE-2021-38205
CVE-2019-13272CVE-2019-2101CVE-2020-27675CVE-2021-38208
CVE-2019-14283CVE-2019-3459CVE-2020-27786CVE-2021-39634
CVE-2019-14284CVE-2019-3460CVE-2020-27815CVE-2021-39657
CVE-2019-14615CVE-2019-3846CVE-2020-27825CVE-2021-40490
CVE-2019-14814CVE-2019-3882CVE-2020-28097CVE-2021-4157
CVE-2019-14815CVE-2019-5108CVE-2020-28374CVE-2021-42008
CVE-2019-14816CVE-2019-5489CVE-2020-28915CVE-2021-45485
CVE-2019-14821CVE-2019-9213CVE-2020-28974CVE-2021-45486
CVE-2019-14835CVE-2019-9445CVE-2020-29370
CVE-2019-14895CVE-2019-9455CVE-2020-29371
CVE-2019-14896CVE-2019-9503CVE-2020-29568
CVE-2019-14897CVE-2019-9506CVE-2020-29660
CVE-2019-14901CVE-2020-0009CVE-2020-29661
CVE-2019-15212CVE-2020-0030CVE-2020-35508
CVE-2019-15214CVE-2020-0255CVE-2020-35519
CVE-2019-15216CVE-2020-0404CVE-2020-36312
CVE-2019-15218CVE-2020-0427CVE-2020-36386
CVE-2019-15219CVE-2020-0543CVE-2020-3702
CVE-2019-15239CVE-2020-10135CVE-2020-8428
CVE-2019-15292CVE-2020-10690CVE-2020-8647
CVE-2019-15666CVE-2020-10711CVE-2020-8648
CVE-2019-15807CVE-2020-10720CVE-2020-8649
CVE-2019-15916CVE-2020-10732CVE-2020-8694
CVE-2019-15917CVE-2020-10751CVE-2020-8992
CVE-2019-15926CVE-2020-10766CVE-2020-9383
CVE-2019-16413CVE-2020-10767CVE-2021-0129
CVE-2019-16746CVE-2020-10768CVE-2021-0447
CVE-2019-16995CVE-2020-10942CVE-2021-0448
CVE-2019-17052CVE-2020-11565CVE-2021-0512
CVE-2019-17053CVE-2020-12352CVE-2021-0920
CVE-2019-17054CVE-2020-12464CVE-2021-0937
CVE-2019-17055CVE-2020-12652CVE-2021-1048
CVE-2019-17056CVE-2020-12656CVE-2021-20261
CVE-2019-17133CVE-2020-12769CVE-2021-21781
CVE-2019-17351CVE-2020-12770CVE-2021-22555
CVE-2019-18282CVE-2020-12771CVE-2021-23133
CVE-2019-18660CVE-2020-12826CVE-2021-23134
CVE-2019-18805CVE-2020-13143CVE-2021-26931

Last updated on 2022-04-29 by george.hsiao