Skip to main content

UC-8100

Moxa Industrial Linux(MIL) 1.2.0 for UC-8100 Series

System Image VersionBuild No.Debian Ver.Kernel Ver.Release Date
v3.6221206159.13linux 4.4.302-cip70-rt40-moxa5+deb93/6/2023

Table of contents

  1. Moxa Package Change Log
  2. Debian Software Package Change Log
  3. Debian Security Patch
  4. Kernel Security Patch

Moxa Package Change Log

For detail change log of each package, refers to UC-8100 MIL 1.2 Change Log

PackageTypeVersionMajor Reason
moxa-bootloader-managerAdd'0.2.0+deb9'Bootloader upgrade utility
jjplus-rtl8822bu-driver-4.4.0-cip-rt-moxa-am335xUpgrade'1.1.0-moxa11' to '1.2.0-moxa5'Update the build dependent kernel version to 4.4.302-cip70-rt40-moxa5
linux-headers-4.4.0-cip-rt-moxa-am335xUpgrade'4.4.285-cip63-rt36-moxa11+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Update compiling tool for kernel version 4.4.302-cip70-rt40
linux-kbuild-4.4.0-cip-rt-moxa-am335xUpgrade'4.4.285-cip63-rt36-moxa11+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Update compiling tool for kernel version 4.4.302-cip70-rt40
moxa-at-cmdUpgrade'0.9.2-1' to '0.9.4-1'Resolve a potential crash problem that may occur when the device fails to open.
moxa-cellular-signaldUpgrade'2.11.2' to '2.11.8'Corrected cell_mgmt version number
moxa-cellular-utilsUpgrade'2.11.2' to '2.11.8'Corrected cell_mgmt version number
moxa-mil-base-system-armhfUpgrade'1.0.0+deb9' to '1.1.0+deb9'Update MIL common package list
moxa-versionUpgrade'1.2.0+deb9' to '1.3.3+deb9'Fix CVE-2022-3088, which through successful exploitation of the improper privilege management vulnerability could allow a local user with normal privileges to change their settings so they have root privileges on affected devices.
moxa-wifi-signaldUpgrade'1.8.8' to '1.8.9'Support additional UC models
moxa-wifi-utilsUpgrade'1.8.8' to '1.8.9'Support additional UC models
sparklan-qca9377-driver-4.4.0-cip-rt-moxa-am335xUpgrade'4.4.285-cip63-rt36-moxa11+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Update the build dependent kernel version to 4.4.302-cip70-rt40-moxa5
uc8100-base-systemUpgrade'3.5.6' to '3.6.0'Update UC-8100 package list
uc8100-kernelUpgrade'4.4.285-cip63-rt36-moxa11+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Fix an issue in which the return value always shows failure even after successfully setting the watchdog timer flag WDIOS_ENABLECARD or WDIOS_DISABLECARD
uc8100-modules-stdUpgrade'4.4.285-cip63-rt36-moxa11+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Refers to uc8100-kernel
mxp-common-udev-rulesUpgrade'1.1.0' to '1.1.1'Removed unnecessary dependencies packages

Debian Software Package Change Log

For detail change log of each package, refers to UC-8100 MIL 1.2 Change Log

PackageTypeVersion
liblzo2-2Add'2.08-1.2+b2'
mtd-utilsAdd'1:2.0.0-1'
apache2Upgrade'2.4.25-3+deb9u11' to '2.4.25-3+deb9u14'
apache2-binUpgrade'2.4.25-3+deb9u11' to '2.4.25-3+deb9u14'
apache2-dataUpgrade'2.4.25-3+deb9u11' to '2.4.25-3+deb9u14'
apache2-utilsUpgrade'2.4.25-3+deb9u11' to '2.4.25-3+deb9u14'
bluezUpgrade'5.43-2+deb9u5' to '5.43-2+deb9u6'
dbusUpgrade'1.10.32-0+deb9u1' to '1.10.32-0+deb9u2'
debian-archive-keyringUpgrade'2017.5+deb9u1' to '2017.5+deb9u2'
dpkgUpgrade'1.18.25' to '1.18.26'
gnupgUpgrade'2.1.18-8.~deb9u4' to '2.1.18-8.~deb9u5'
gnupg-agentUpgrade'2.1.18-8.~deb9u4' to '2.1.18-8.~deb9u5'
gpgvUpgrade'2.1.18-8.~deb9u4' to '2.1.18-8.~deb9u5'
gzipUpgrade'1.6-5+b1' to '1.6-5+deb9u1'
isc-dhcp-clientUpgrade'4.3.5-3+deb9u2' to '4.3.5-3+deb9u3'
isc-dhcp-commonUpgrade'4.3.5-3+deb9u2' to '4.3.5-3+deb9u3'
libapr1Upgrade'1.5.2-5' to '1.5.2-5+deb9u1'
libc-binUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
libc-l10nUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
libc6Upgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
libcurl3Upgrade'7.52.1-5+deb9u16' to '7.52.1-5+deb9u17'
libcurl3-gnutlsUpgrade'7.52.1-5+deb9u16' to '7.52.1-5+deb9u17'
libdbus-1-3Upgrade'1.10.32-0+deb9u1' to '1.10.32-0+deb9u2'
libdns-export162Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u10' to '1:9.10.3.dfsg.P4-12.3+deb9u13'
libexpat1Upgrade'2.2.0-2+deb9u3' to '2.2.0-2+deb9u7'
libglib2.0-0Upgrade'2.50.3-2+deb9u2' to '2.50.3-2+deb9u4'
libisc-export160Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u10' to '1:9.10.3.dfsg.P4-12.3+deb9u13'
libksba8Upgrade'1.3.5-2' to '1.3.5-2+deb9u1'
libldap-2.4-2Upgrade'2.4.44+dfsg-5+deb9u8' to '2.4.44+dfsg-5+deb9u9'
libldap-commonUpgrade'2.4.44+dfsg-5+deb9u8' to '2.4.44+dfsg-5+deb9u9'
liblzma5Upgrade'5.2.2-1.2+b1' to '5.2.2-1.2+deb9u1'
libncurses5Upgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
libncursesw5Upgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
libpam-systemdUpgrade'232-25+deb9u13' to '232-25+deb9u15'
libpolkit-agent-1-0Upgrade'0.105-18+deb9u1' to '0.105-18+deb9u2'
libpolkit-gobject-1-0Upgrade'0.105-18+deb9u1' to '0.105-18+deb9u2'
libsasl2-2Upgrade'2.1.27.~101-g0780600+dfsg-3+deb9u1' to '2.1.27.~101-g0780600+dfsg-3+deb9u2'
libsasl2-modules-dbUpgrade'2.1.27.~101-g0780600+dfsg-3+deb9u1' to '2.1.27.~101-g0780600+dfsg-3+deb9u2'
libsnmp-baseUpgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
libsnmp30Upgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
libsqlite3-0Upgrade'3.16.2-5+deb9u3' to '3.16.2-5+deb9u4'
libssl1.0.2Upgrade'1.0.2u-1.~deb9u6' to '1.0.2u-1.~deb9u7'
libssl1.1Upgrade'1.1.0l-1.~deb9u4' to '1.1.0l-1.~deb9u7'
libsystemd0Upgrade'232-25+deb9u13' to '232-25+deb9u15'
libtinfo5Upgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
libudev1Upgrade'232-25+deb9u13' to '232-25+deb9u15'
libxml2Upgrade'2.9.4+dfsg1-2.2+deb9u5' to '2.9.4+dfsg1-2.2+deb9u9'
localesUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
multiarch-supportUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
ncurses-baseUpgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
ncurses-binUpgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
opensslUpgrade'1.1.0l-1.~deb9u4' to '1.1.0l-1.~deb9u7'
rsyslogUpgrade'8.24.0-1+deb9u1' to '8.24.0-1+deb9u3'
snmpUpgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
snmpdUpgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
sudoUpgrade'1.8.19p1-2.1+deb9u3' to '1.8.19p1-2.1+deb9u4'
systemdUpgrade'232-25+deb9u13' to '232-25+deb9u15'
systemd-sysvUpgrade'232-25+deb9u13' to '232-25+deb9u15'
tzdataUpgrade'2021a-0+deb9u2' to '2021a-0+deb9u7'
udevUpgrade'232-25+deb9u13' to '232-25+deb9u15'
vimUpgrade'2:8.0.0197-4+deb9u3' to '2:8.0.0197-4+deb9u7'
vim-commonUpgrade'2:8.0.0197-4+deb9u3' to '2:8.0.0197-4+deb9u7'
vim-runtimeUpgrade'2:8.0.0197-4+deb9u3' to '2:8.0.0197-4+deb9u7'
wireless-regdbUpgrade'2016.06.10-1' to '2022.04.08-1.~deb9u1'
xxdUpgrade'2:8.0.0197-4+deb9u3' to '2:8.0.0197-4+deb9u7'
zlib1gUpgrade'1:1.2.8.dfsg-5' to '1:1.2.8.dfsg-5+deb9u2'
libgcrypt20Downgrade'1.8.4-4' to '1.7.6-2+deb9u4'

Debian Security Patch

Refers to UC-8100 MIL 1.2 Change Log

Kernel Security Patch

Refer to below table for the list of kernel security patch

CVE-2020-29374CVE-2022-1011
CVE-2020-36516CVE-2022-1016
CVE-2021-20321CVE-2022-1198
CVE-2021-26401CVE-2022-1353
CVE-2021-28711CVE-2022-1516
CVE-2021-28712CVE-2022-1652
CVE-2021-28713CVE-2022-1729
CVE-2021-28715CVE-2022-1734
CVE-2021-37159CVE-2022-1836
CVE-2021-3752CVE-2022-1974
CVE-2021-3760CVE-2022-1975
CVE-2021-3896CVE-2022-20368
CVE-2021-39685CVE-2022-20423
CVE-2021-4002CVE-2022-2380
CVE-2021-4034CVE-2022-24958
CVE-2021-4083CVE-2022-25258
CVE-2021-4149CVE-2022-25375
CVE-2021-4155CVE-2022-2639
CVE-2021-4202CVE-2022-26490
CVE-2021-4203CVE-2022-26966
CVE-2021-43389CVE-2022-27223
CVE-2021-43976CVE-2022-28356
CVE-2021-45095CVE-2022-28390
CVE-2021-45868CVE-2022-2964
CVE-2022-0001CVE-2022-30594
CVE-2022-0002CVE-2022-3202
CVE-2022-0330CVE-2022-32296
CVE-2022-0487CVE-2022-32981
CVE-2022-0494CVE-2022-33981
CVE-2022-0617CVE-2022-41858

Last updated on 2023-03-03 by Elvis Yao