Skip to content

Commit

Permalink
Update 04.02.13-FW24
Browse files Browse the repository at this point in the history
  • Loading branch information
dicksimon committed Apr 17, 2023
1 parent 1f1dbb6 commit bbc8de8
Show file tree
Hide file tree
Showing 5,198 changed files with 194,968 additions and 182,501 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
6 changes: 3 additions & 3 deletions .gitattributes
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
src/boost_1_68_0.tar.bz2 filter=lfs diff=lfs merge=lfs -text
src/production-wago-pfcXXX-r46083.tar filter=lfs diff=lfs merge=lfs -text
src/linux-5.15.19.tar.xz filter=lfs diff=lfs merge=lfs -text
ptxproj/src/boost_1_68_0.tar.bz2 filter=lfs diff=lfs merge=lfs -text
ptxproj/src/go1.18.7.linux-amd64.tar.gz filter=lfs diff=lfs merge=lfs -text
ptxproj/src/linux-5.15.86-rt56-w04.01.07.tgz filter=lfs diff=lfs merge=lfs -text
6 changes: 2 additions & 4 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -1,7 +1,5 @@
**/out/gcc_5_5_arm-linux-gnueabihf/
**/bin/gcc_5_5_arm-linux-gnueabihf/
**/out/gcc_9_2_arm-linux-gnueabihf/
**/bin/gcc_9_2_arm-linux-gnueabihf/
**/out/gcc_*_*_arm-linux-gnueabihf/
**/bin/gcc_*_*_arm-linux-gnueabihf/
selected_platformconfig
selected_ptxconfig
selected_toolchain
52 changes: 52 additions & 0 deletions Changelog
Original file line number Diff line number Diff line change
@@ -1,3 +1,55 @@
Firmware Release 04.02.13 (24) – CODESYS 3

System:
[FIXED] WAT33700 WAT-33700 Fixed erroneous logrotate configuration which leads to crash of CODESYS runtime when OpenVPN is used.
[DEPRECATED] Config tool “config_mdmd” and “update_modem_firmware” will be re-moved in future firmware versions
[CHANGED] Reduced CBM functionality to basic use cases

Operating System:
[FIXED] Replaced Busybox wget by upstream wget
[FIXED] SECURITY CVE-2022-0529, CVE-2022-0530, CVE-2022-35260, CVE-2022-32221, CVE-2013-4235, CVE-2022-43995, CVE-2022-44792, CVE-2022-44793,
CVE-2022-43680, CVE-2022-2309, CVE-2022-40303 , CVE-2022-40304, CVE-2022-40476, CVE-2022-2905, CVE-2022-35252, CVE-2022-40674, CVE-2022-40284, CVE-2022-1012, CVE-2022-37434, CVE-2021-33656, CVE-2022-2327, CVE-2022-36879, CVE-2022-1671, CVE-2022-34494, CVE-2022-34495, CVE-2020-35501, CVE-2022-1998, CVE-2022-30788, CVE-2022-30789, CVE-2022-30783,CVE-2022-30785, CVE-2022-30786, CVE-2022-30784, CVE-2022-1882, CVE-2022-32296, CVE-2022-29581, CVE-2022-30594, CVE-2022-1015, CVE-2022-1048, CVE-2022-1353, CVE-2022-29824, CVE-2022-29824, CVE-2022-1055, CVE-2022-28391, CVE-2022-37434, CVE-2021-45868, CVE-2022-27666, CVE-2022-23219, CVE-2022-23219, CVE-2022-1348, CVE-2022-23471, CVE-2022-31030
[KNOWN] SECURITY Improper handling of unicode string could crash unzip 6.0(CVE-2021-4217)

Runtime Sytem
[NEW] Codesys3 Runtime-System 3.5.18.20
[FIXED] Sporadic error while running the Codesys3 WebVisu with HTTP
[FIXED] “PLC load watchdog” might not work as espected: the plc load watchdog will detect (e.g. an endless loop) but the IEC task might not be
stopped in any case. This might lead to a complete stop of the runtime process. As workaround and improve “hardening” of your IEC application we recom-mend to use an IEC Task watchdog on all your relevant IEC tasks in your IEC application.
[FIXED] SECURITY CVE-2022-22516, CVE-2021-21863, CVE-2021-21864, CVE-2021-21865, CVE-2021-21866, CVE-2021-21867, CVE-2021-21868,
CVE-2021-21869, CVE-2022-1794, CVE-2022-22517, CVE-2022-22518, CVE-2022-22513, CVE-2022-22514, CVE-2022-22519, CVE-2022-30791, CVE-2022-30792

Fieldbus Interface & Protocols:
[NEW] Support of CODESYS OPC UA Server and OPC UA Client
[KNOWN] Support of CODESYS OPC UA PubSub Libraries
[KNOWN] If the subscription of the CmpOPCUAClient cannot be established cor-rectly and the OPC UA server is then shut down, a SIGABRT occurs
in Runtime.
[CHANGED] The “WagoSysVisuBACnet” library is not support with firmware 24
Saving trap receiver address after firmware up-/downgrade

Libraries:
[NEW] Support of CODESYS OPC UA PubSub Libraries
[FIXED] Docker Bridge Networking not working with Docker Swarm
[REMOVED] WagoAppEtherNetIP_Adapter and WagoSysEtherNetIP_Adapter Please use native CODESYS 3.5 EtherNet/IP adapter
[KNOWN] Simulation might fail with some libraries within IDE

Web Based Management:
[NEW] Update to PHP 8.1.9
[NEW] Diagnostic information for Cloud-Connectivity on status page
[FIXED] Do not start a restore of the system package if the device has booted from the memory card
[FIXED] Leading digits for host names
[FIXED] Backup & Restore is executable by user “root”
[FIXED] Added note text to explain the hostname behavior
[REMOVED] “guest” access
[CHANGED] Description for the certificate folder and configuration

Beta functionalities:
[BETA] "Wago Device Access" for parametrization and configuration. REST-API is active under path "<host>/wda" on port 443. File-Access-API is
active under path "<host>/files" on port 443. To disable the service, delete symlink "/etc/rc.d/S11_paramd" or move it to subdirectory "disabled"
[BETA] A documentation for the REST-API of "Wago Device Access" is availa-ble from device by calling specified URL: OpenAPI-JSON: <ip/
hostname>/openapi/wda.openapi.json HTML format: <ip/hostname>/openapi/wda.openapi.html

################################################################################
Firmware Release 04.01.10 (99)

System:
Expand Down
12 changes: 12 additions & 0 deletions Dockerfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
ARG REGISTRY_PREFIX='wagoautomation/'
ARG SDK_BUILDER_VERSION='1.0.0'

FROM ${REGISTRY_PREFIX}sdk-builder:${SDK_BUILDER_VERSION} as pfc-firmware-sdk-G2


ARG USERID
RUN useradd -u "$USERID" -ms /bin/bash user
RUN chown -R user:user /home/user
COPY --chown=user:user build.sh /usr/local/bin/build
COPY --chown=user:user certs/* /usr/local/share/ca-certificates/
RUN update-ca-certificates
Loading

0 comments on commit bbc8de8

Please sign in to comment.