Skip to main content

UC-8580

Moxa Industrial Linux(MIL) 1.2.0 for UC-8580 Series

System Image VersionBuild No.Debian Ver.Kernel Ver.Release Date
v2.2221206159.13linux 4.4.302-cip70-rt40-moxa5+deb93/6/2023

Table of contents

  1. Moxa Package Change Log
  2. Debian Software Package Change Log
  3. Debian Security Patch
  4. Kernel Security Patch

Moxa Package Change Log

For detail change log of each package, refers to UC-8580 MIL 1.2 Change Log

PackageTypeVersionMajor Reason
moxa-bootloader-managerAdd'0.2.0+deb9'Bootloader upgrade utility
linux-headers-4.4.0-cip-rt-moxa-ls102xaUpgrade'4.4.285-cip63-rt36-moxa16+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Update compiling tool for kernel version 4.4.302-cip70-rt40
linux-kbuild-4.4.0-cip-rt-moxa-ls102xaUpgrade'4.4.285-cip63-rt36-moxa16+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Update compiling tool for kernel version 4.4.302-cip70-rt40
moxa-cellular-signaldUpgrade'2.11.2' to '2.11.8'Corrected cell_mgmt version number
moxa-cellular-utilsUpgrade'2.11.2' to '2.11.8'Corrected cell_mgmt version number
moxa-mil-base-system-armhfUpgrade'1.0.0+deb9u1' to '1.1.0+deb9'Update MIL common package list
moxa-versionUpgrade'1.2.0+deb9' to '1.3.3+deb9'Fix CVE-2022-3088, which through a uccessful exploitation of the improper privilege management vulnerability could allow a local user with normal privileges to change their settings so they have root privileges on affected devices.
uc8580-base-systemUpgrade'1.2.1' to '1.3.0'Update UC-8580 package list
uc8580-kernelUpgrade'4.4.285-cip63-rt36-moxa16+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Fix an issue in which the return value always shows failure even after successfully setting the watchdog timer flag WDIOS_ENABLECARD or WDIOS_DISABLECARD
uc8580-modulesUpgrade'4.4.285-cip63-rt36-moxa16+deb9' to '4.4.302-cip70-rt40-moxa5+deb9'Refers to uc8580-kernel
mxp-common-udev-rulesUpgrade'1.1.0' to '1.1.1'Removed unnecessary dependencies packages

Debian Software Package Change Log

For detail change log of each package, refers to UC-8580 MIL 1.2 Change Log

PackageTypeVersion
firmware-misc-nonfreeAdd'20190114-2./~deb9u1'
liblzo2-2Add'2.08-1.2+b2'
mtd-utilsAdd'1:2.0.0-1'
apache2Upgrade'2.4.25-3+deb9u13' to '2.4.25-3+deb9u14'
apache2-binUpgrade'2.4.25-3+deb9u13' to '2.4.25-3+deb9u14'
apache2-dataUpgrade'2.4.25-3+deb9u13' to '2.4.25-3+deb9u14'
apache2-utilsUpgrade'2.4.25-3+deb9u13' to '2.4.25-3+deb9u14'
curlUpgrade'7.52.1-5+deb9u16' to '7.52.1-5+deb9u17'
dbusUpgrade'1.10.32-0+deb9u1' to '1.10.32-0+deb9u2'
dpkgUpgrade'1.18.25' to '1.18.26'
gnupgUpgrade'2.1.18-8./~deb9u4' to '2.1.18-8./~deb9u5'
gnupg-agentUpgrade'2.1.18-8./~deb9u4' to '2.1.18-8./~deb9u5'
gpgvUpgrade'2.1.18-8./~deb9u4' to '2.1.18-8./~deb9u5'
gzipUpgrade'1.6-5+b1' to '1.6-5+deb9u1'
isc-dhcp-clientUpgrade'4.3.5-3+deb9u2' to '4.3.5-3+deb9u3'
isc-dhcp-commonUpgrade'4.3.5-3+deb9u2' to '4.3.5-3+deb9u3'
libc-binUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
libc-l10nUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
libc6Upgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
libcurl3Upgrade'7.52.1-5+deb9u16' to '7.52.1-5+deb9u17'
libcurl3-gnutlsUpgrade'7.52.1-5+deb9u16' to '7.52.1-5+deb9u17'
libdbus-1-3Upgrade'1.10.32-0+deb9u1' to '1.10.32-0+deb9u2'
libdns-export162Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u12' to '1:9.10.3.dfsg.P4-12.3+deb9u13'
libexpat1Upgrade'2.2.0-2+deb9u5' to '2.2.0-2+deb9u7'
libglib2.0-0Upgrade'2.50.3-2+deb9u2' to '2.50.3-2+deb9u4'
libisc-export160Upgrade'1:9.10.3.dfsg.P4-12.3+deb9u12' to '1:9.10.3.dfsg.P4-12.3+deb9u13'
libksba8Upgrade'1.3.5-2' to '1.3.5-2+deb9u1'
libldap-2.4-2Upgrade'2.4.44+dfsg-5+deb9u8' to '2.4.44+dfsg-5+deb9u9'
libldap-commonUpgrade'2.4.44+dfsg-5+deb9u8' to '2.4.44+dfsg-5+deb9u9'
liblzma5Upgrade'5.2.2-1.2+b1' to '5.2.2-1.2+deb9u1'
libncurses5Upgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
libncursesw5Upgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
libpam-systemdUpgrade'232-25+deb9u13' to '232-25+deb9u15'
libsnmp-baseUpgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
libsnmp30Upgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
libsqlite3-0Upgrade'3.16.2-5+deb9u3' to '3.16.2-5+deb9u4'
libssl1.1Upgrade'1.1.0l-1./~deb9u5' to '1.1.0l-1./~deb9u7'
libsystemd0Upgrade'232-25+deb9u13' to '232-25+deb9u15'
libtinfo5Upgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
libudev1Upgrade'232-25+deb9u13' to '232-25+deb9u15'
libxml2Upgrade'2.9.4+dfsg1-2.2+deb9u6' to '2.9.4+dfsg1-2.2+deb9u9'
localesUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
multiarch-supportUpgrade'2.24-11+deb9u4' to '2.24-11+deb9u5'
ncurses-baseUpgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
ncurses-binUpgrade'6.0+20161126-1+deb9u2' to '6.0+20161126-1+deb9u3'
opensslUpgrade'1.1.0l-1./~deb9u5' to '1.1.0l-1./~deb9u7'
rsyslogUpgrade'8.24.0-1+deb9u1' to '8.24.0-1+deb9u3'
snmpUpgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
snmpdUpgrade'5.7.3+dfsg-1.7+deb9u3' to '5.7.3+dfsg-1.7+deb9u4'
sudoUpgrade'1.8.19p1-2.1+deb9u3' to '1.8.19p1-2.1+deb9u4'
systemdUpgrade'232-25+deb9u13' to '232-25+deb9u15'
systemd-sysvUpgrade'232-25+deb9u13' to '232-25+deb9u15'
tzdataUpgrade'2021a-0+deb9u3' to '2021a-0+deb9u7'
udevUpgrade'232-25+deb9u13' to '232-25+deb9u15'
vimUpgrade'2:8.0.0197-4+deb9u5' to '2:8.0.0197-4+deb9u7'
vim-commonUpgrade'2:8.0.0197-4+deb9u5' to '2:8.0.0197-4+deb9u7'
vim-runtimeUpgrade'2:8.0.0197-4+deb9u5' to '2:8.0.0197-4+deb9u7'
wireless-regdbUpgrade'2016.06.10-1' to '2022.04.08-1./~deb9u1'
xxdUpgrade'2:8.0.0197-4+deb9u5' to '2:8.0.0197-4+deb9u7'
zlib1gUpgrade'1:1.2.8.dfsg-5+deb9u1' to '1:1.2.8.dfsg-5+deb9u2'

Debian Security Patch

Refers to UC-8580 MIL 1.2 Change Log

Kernel Security Patch

Refer to below table for the list of kernel security patch

CVE-2020-29374CVE-2022-1011
CVE-2020-36516CVE-2022-1016
CVE-2021-20321CVE-2022-1198
CVE-2021-26401CVE-2022-1353
CVE-2021-28711CVE-2022-1516
CVE-2021-28712CVE-2022-1652
CVE-2021-28713CVE-2022-1729
CVE-2021-28715CVE-2022-1734
CVE-2021-37159CVE-2022-1836
CVE-2021-3752CVE-2022-1974
CVE-2021-3760CVE-2022-1975
CVE-2021-3896CVE-2022-20368
CVE-2021-39685CVE-2022-20423
CVE-2021-4002CVE-2022-2380
CVE-2021-4034CVE-2022-24958
CVE-2021-4083CVE-2022-25258
CVE-2021-4149CVE-2022-25375
CVE-2021-4155CVE-2022-2639
CVE-2021-4202CVE-2022-26490
CVE-2021-4203CVE-2022-26966
CVE-2021-43389CVE-2022-27223
CVE-2021-43976CVE-2022-28356
CVE-2021-45095CVE-2022-28390
CVE-2021-45868CVE-2022-2964
CVE-2022-0001CVE-2022-30594
CVE-2022-0002CVE-2022-3202
CVE-2022-0330CVE-2022-32296
CVE-2022-0487CVE-2022-32981
CVE-2022-0494CVE-2022-33981
CVE-2022-0617CVE-2022-41858

Last updated on 2023-03-03 by Elvis Yao