Skip to main content

UC-8540

Moxa Industrial Linux(MIL) 1.2.0 for UC-8540 Series

System Image VersionBuild No.Debian Ver.Kernel Ver.Release Date
v2.2221213169.13linux 4.4.302-cip70-rt40-moxa5+deb93/6/2023

Table of contents

  1. Moxa Package Change Log
  2. Debian Software Package Change Log
  3. Debian Security Patch
  4. Kernel Security Patch

Moxa Package Change Log

For detail change log of each package, refers to UC-8540 MIL 1.2 Change Log

PackageTypeVersionMajor Reason
moxa-bootloader-managerAdd'0.2.0+deb9'Bootloader upgrade utility
uc8540-setinterfaceAdd'1.3.0'1. Correct parsing for root device node with storage is not mmcblk device when do partition extension.
2. Remove symbolic link for ttyMI due to modularized smartIO
linux-headers-4.4.0-cip-rt-moxa-ls102xaUpgrade'4.4.285-cip63-rt36-moxa16+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Update compiling tool for kernel version 4.4.302-cip70-rt40
linux-kbuild-4.4.0-cip-rt-moxa-ls102xaUpgrade'4.4.285-cip63-rt36-moxa16+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Update compiling tool for kernel version 4.4.302-cip70-rt40
moxa-cellular-signaldUpgrade'2.11.2' to '2.11.8'Corrected cell_mgmt version number
moxa-cellular-utilsUpgrade'2.11.2' to '2.11.8'Corrected cell_mgmt version number
moxa-mil-base-system-armhfUpgrade'1.0.0+deb9u1' to '1.1.0+deb9'Update MIL common package list
moxa-versionUpgrade'1.2.0+deb9' to '1.3.3+deb9'Fix CVE-2022-3088, which through a uccessful exploitation of the improper privilege management vulnerability could allow a local user with normal privileges to change their settings so they have root privileges on affected devices.
uc8540-base-systemUpgrade'1.2.1' to '1.3.0'Update UC-8540 package list
uc8540-kernelUpgrade'4.4.285-cip63-rt36-moxa16+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Fix an issue in which the return value always shows failure even after successfully setting the watchdog timer flag WDIOS_ENABLECARD or WDIOS_DISABLECARD
uc8540-modulesUpgrade'4.4.285-cip63-rt36-moxa16+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Refers to uc8540-kernel
mxp-common-udev-rulesUpgrade'1.1.0' to '1.1.1'Removed unnecessary dependencies packages

Debian Software Package Change Log

For detail change log of each package, refers to UC-8540 MIL 1.2 Change Log

PackageTypeVersion
firmware-misc-nonfreeAdd'20190114-2./~deb9u1'
mtd-utilsAdd'1:2.0.0-1'
apache2Upgrade'2.4.25-3+deb9u13' to '2.4.25-3+deb9u14'
apache2-binUpgrade'2.4.25-3+deb9u13' to '2.4.25-3+deb9u14'
apache2-dataUpgrade'2.4.25-3+deb9u13' to '2.4.25-3+deb9u14'
apache2-utilsUpgrade'2.4.25-3+deb9u13' to '2.4.25-3+deb9u14'
curlUpgrade'7.52.1-5+deb9u16' to '7.52.1-5+deb9u17'
dbusUpgrade'1.10.32-0+deb9u1' to '1.10.32-0+deb9u2'
dpkgUpgrade'1.18.25' to '1.18.26'
gnupgUpgrade'2.1.18-8./~deb9u4' to '2.1.18-8./~deb9u5'
gnupg-agentUpgrade'2.1.18-8./~deb9u4' to '2.1.18-8./~deb9u5'
gpgvUpgrade'2.1.18-8./~deb9u4' to '2.1.18-8./~deb9u5'
gzipUpgrade'1.6-5+b1' to '1.6-5+deb9u1'
isc-dhcp-clientUpgrade'4.3.5-3+deb9u2' to '4.3.5-3+deb9u3'
isc-dhcp-commonUpgrade'4.3.5-3+deb9u2' to '4.3.5-3+deb9u3'
libc-binUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
libc-dev-binUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
libc-l10nUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
libc6Upgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
libc6-devUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
libcurl3Upgrade'7.52.1-5+deb9u16' to '7.52.1-5+deb9u17'
libcurl3-gnutlsUpgrade'7.52.1-5+deb9u16' to '7.52.1-5+deb9u17'
libcurl4-gnutls-devUpgrade'7.52.1-5+deb9u16' to '7.52.1-5+deb9u17'
libdbus-1-3Upgrade'1.10.32-0+deb9u1' to '1.10.32-0+deb9u2'
libdns-export162Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u12' to '1:9.10.3.dfsg.P4-12.3+deb9u13'
libexpat1Upgrade'2.2.0-2+deb9u5' to '2.2.0-2+deb9u7'
libexpat1-devUpgrade'2.2.0-2+deb9u5' to '2.2.0-2+deb9u7'
libglib2.0-0Upgrade'2.50.3-2+deb9u2' to '2.50.3-2+deb9u4'
libisc-export160Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u12' to '1:9.10.3.dfsg.P4-12.3+deb9u13'
libksba8Upgrade'1.3.5-2' to '1.3.5-2+deb9u1'
libldap-2.4-2Upgrade'2.4.44+dfsg-5+deb9u8' to '2.4.44+dfsg-5+deb9u9'
libldap-commonUpgrade'2.4.44+dfsg-5+deb9u8' to '2.4.44+dfsg-5+deb9u9'
liblzma5Upgrade'5.2.2-1.2+b1' to '5.2.2-1.2+deb9u1'
libncurses5Upgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
libncursesw5Upgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
libpam-systemdUpgrade'232-25+deb9u13' to '232-25+deb9u15'
libsnmp-baseUpgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
libsnmp30Upgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
libsqlite3-0Upgrade'3.16.2-5+deb9u3' to '3.16.2-5+deb9u4'
libssl1.1Upgrade'1.1.0l-1./~deb9u5' to '1.1.0l-1./~deb9u7'
libsystemd0Upgrade'232-25+deb9u13' to '232-25+deb9u15'
libtinfo5Upgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
libudev1Upgrade'232-25+deb9u13' to '232-25+deb9u15'
libxml2Upgrade'2.9.4+dfsg1-2.2+deb9u6' to '2.9.4+dfsg1-2.2+deb9u9'
linux-libc-devUpgrade'4.9.320-2' to '4.9.320-3'
localesUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
multiarch-supportUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
ncurses-baseUpgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
ncurses-binUpgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
opensslUpgrade'1.1.0l-1./~deb9u5' to '1.1.0l-1./~deb9u7'
rsyslogUpgrade'8.24.0-1+deb9u1' to '8.24.0-1+deb9u3'
snmpUpgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
snmpdUpgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
sudoUpgrade'1.8.19p1-2.1+deb9u3' to '1.8.19p1-2.1+deb9u4'
systemdUpgrade'232-25+deb9u13' to '232-25+deb9u15'
systemd-sysvUpgrade'232-25+deb9u13' to '232-25+deb9u15'
tzdataUpgrade'2021a-0+deb9u3' to '2021a-0+deb9u7'
udevUpgrade'232-25+deb9u13' to '232-25+deb9u15'
vimUpgrade'2:8.0.0197-4+deb9u5' to '2:8.0.0197-4+deb9u7'
vim-commonUpgrade'2:8.0.0197-4+deb9u5' to '2:8.0.0197-4+deb9u7'
vim-runtimeUpgrade'2:8.0.0197-4+deb9u5' to '2:8.0.0197-4+deb9u7'
wireless-regdbUpgrade'2016.06.10-1' to '2022.04.08-1./~deb9u1'
xxdUpgrade'2:8.0.0197-4+deb9u5' to '2:8.0.0197-4+deb9u7'
zlib1gUpgrade'1:1.2.8.dfsg-5+deb9u1' to '1:1.2.8.dfsg-5+deb9u2'

Debian Security Patch

Refers to UC-8540 MIL 1.2 Change Log

Kernel Security Patch

Refer to below table for the list of kernel security patch

CVE-2020-29374CVE-2022-1011
CVE-2020-36516CVE-2022-1016
CVE-2021-20321CVE-2022-1198
CVE-2021-26401CVE-2022-1353
CVE-2021-28711CVE-2022-1516
CVE-2021-28712CVE-2022-1652
CVE-2021-28713CVE-2022-1729
CVE-2021-28715CVE-2022-1734
CVE-2021-37159CVE-2022-1836
CVE-2021-3752CVE-2022-1974
CVE-2021-3760CVE-2022-1975
CVE-2021-3896CVE-2022-20368
CVE-2021-39685CVE-2022-20423
CVE-2021-4002CVE-2022-2380
CVE-2021-4034CVE-2022-24958
CVE-2021-4083CVE-2022-25258
CVE-2021-4149CVE-2022-25375
CVE-2021-4155CVE-2022-2639
CVE-2021-4202CVE-2022-26490
CVE-2021-4203CVE-2022-26966
CVE-2021-43389CVE-2022-27223
CVE-2021-43976CVE-2022-28356
CVE-2021-45095CVE-2022-28390
CVE-2021-45868CVE-2022-2964
CVE-2022-0001CVE-2022-30594
CVE-2022-0002CVE-2022-3202
CVE-2022-0330CVE-2022-32296
CVE-2022-0487CVE-2022-32981
CVE-2022-0494CVE-2022-33981
CVE-2022-0617CVE-2022-41858

Last updated on 2023-03-03 by Elvis Yao