E8372h Firmware Release Notes V1.0: Huawei Technologies Co., LTD

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Product name Confidentiality level

E8372h CONFIDENTIAL
Product version
Total 8 pages
V1.0

E8372h Firmware Release Notes


V1.0

Prepared by V7R11 team Date 2016-09-19


Reviewed by V7R11 team Date 2016-09-19
Approved by Date

Huawei Technologies Co., Ltd.

All rights reserved


Revision Record
Date Revision FW-WebUI/Stick Change Description Author
version Version
2016-09-19 1.0 FW First version V7R11 team
21.321.01.00.00

2017-3-16 1.0 FW21.323.01.00.00 MR version liuming


2017-8-01 1.0 FW21.327.01.00.00 MR version liuming
2017-9-18 1.0 FW21.328.01.00.00 MR version Xiayichao
2017-10-24 1.0 FW21.328.03.00.00 MR version Xiayichao
2018-09-21 1.0 FW21.333.01.00.00 MR version E8372h-153
Team
2019-11-7 1.0 FW21.333.03.00.00 MR version E8372h-153
Team
Table of Contents
1 Main Features .............................................................................................................................. 4
2 Hardware ..................................................................................................................................... 4
2.1 Hardware Specifications ....................................................................................................... 4
3 Firmware ...................................................................................................................................... 5
3.1 Version Description ............................................................................................................... 5
3.2 Firmware Specifications ........................................................................................................ 5
3.3 Improvement in the Previous Version .................................................................................. 5
3.1 Known Limitations and Issues .............................................................................................. 6
4 WebUI/HiLink ............................................................................................................................... 6
4.1 Version Description ............................................................................................................... 6
4.2 WebUI/HiLink Specifications................................................................................................. 6
4.3 Improvement in the Previous Version .................................................................................. 6
4.4 Known Limitations and Issues .............................................................................................. 6
5 Software Vulnerabilities Fixes..................................................................................................... 7
6 Accessory Product from other Vendor ..................................................................................... 10
6.1 Known Limitations and Issues ............................................................................................ 11
7 Others ........................................................................................................................................ 11
8 Reference .................................................................................................................................. 11
E8372h Firmware Release Notes V1.0 CONFIDENTIAL

E8372h Firmware Release Notes V1.0

1 Main Features
The E8372h supports the following standards:
 LTE cat4 data service up to 150Mbit/s (Downlink) and 50Mbit/s(Uplink)
 DC-HSPA+ data service up to 43.2 Mbit/s
 HSPA+ data service up to 21.6 Mbit/s
 HSDPA packet data service of up to 14.4 Mbit/s
 HSUPA data service up to 5.76 Mbit/s
 WCDMA PS domain data service of up to 384 Kbit/s
 Equalizer and receive diversity
 microSD Card Slot (Up to 32G)
 Data and SMS Service
 Plug and play
 Standard USB interface
 CSFB

2 Hardware

2.1 Hardware Specifications

Item Specifications
Hardware Version  CL1E8372HM Ver.A
 LTE 3GPP R9
Technical standard  HSPA+/UMTS: 3GPP R99/R5/R6/R7/R8
 GSM/GPRS/EDGE: 3GPP R99
USB: Type A with standard USB 2.0 High speed interface
LED: indicating the status of the Data Card

External interfaces SD card: standard TF card interface

SIM/USIM card: standard 6-pin SIM card interface

RF interface: external RF interface

Maximum power
 3.5 W
consumption

Power supply 5V

Dimensions (D × W × H) About 94mm(D) × 30mm(W) × 14mm (H)

Weight  50g

Page 4
E8372h Firmware Release Notes V1.0 CONFIDENTIAL

Item Specifications
 Operating: –10℃ to +40℃
Temperature
 Storage: –20℃ to +70℃
Humidity 5% to 95%

 Plug and play (PnP)


Base Information
 Standard USB 2.0 High Speed interface, auto installation,
convenient for use
Note:
3GPP = The 3rd Generation Partnership Project
TS = Technical Specification
LED = Light-Emitting Diode
SIM = Subscriber Identity Module
USIM = UMTS Subscriber Identity Module

3 Firmware

3.1 Version Description

Firmware Version: 21.333.03.00.00


Baseline information Balong V7R11 C30B333

3.2 Firmware Specifications

Firmware

Item Specifications
Version 21.333.03.00.00

3.3 Improvement in the Previous Version

Index Case ID Issue Description


Firmware Version 21.333.03.00.00
Previous Firmware
Version
1
2
3
4
5

Page 5
E8372h Firmware Release Notes V1.0 CONFIDENTIAL

3.1 Known Limitations and Issues

Index Case ID Issue Description


1 Unrealized
NA
Features
2

4 WebUI/HiLink

4.1 Version Description

WebUI/HiLink Version: 17.100.21.02.03

4.2 WebUI/HiLink Specifications

Item Specifications

4.3 Improvement in the Previous Version

Index Case ID Issue Description

WebUI Version 17.100.21.02.03


Previous WebUI
Version
1 New Features

4.4 Known Limitations and Issues

Index Case ID Issue Description


Unrealized
1
Features

Page 6
E8372h Firmware Release Notes V1.0 CONFIDENTIAL

5 Software Vulnerabilities Fixes


[Software Vulnerabilities include Android Vulnerability, Third-party software Vulnerability, and Huawei
Vulnerability]

[Android Vulnerability is from Google, which reported publicly.]

[Third-party software is a type of computer software that is sold together with or provided for free in Huawei
products or solutions with the ownership of intellectual property rights (IPR) held by the original contributors.
Third-party software can be but is not limited to: Purchased software, Software that is built in or attached to
purchased hardware, Software in products of the original equipment manufacturer (OEM) or original design
manufacturer (ODM), Software that is developed with technical contribution from partners (ownership of IPR
all or partially held by the partners), Software that is legally obtained free of charge.
The data of third-party software vulnerabilities fixes can be exported from PDM.
If the table is excessively long, you can divide it into multiple ones by product version, or deliver it in an excel
file with patch release notes and provide reference information in this section.]

[Huawei Vulnerability is Huawei own software’ Vulnerability, which found by outside]

Vulnerabilities information is available through CVE IDs in NVD (National Vulnerability Database) website:
http://web.nvd.nist.gov/view/vuln/search
Software/Modul Version CVE ID Vulnerability Solution
e name Description
linux_kernel 3.10 CVE-2017 An elevation of privilege
-0427 vulnerability in the
kernel file system could
enable a local malicious
application to execute
arbitrary code within the
context of the kernel.
This issue is rated as
Critical due to the
http://www.securityfocus.
possibility of a local
com/bid/96071
permanent device
compromise, which may
require reflashing the
operating system to
repair the device.
Product: Android.
Versions: Kernel-3.10,
Kernel-3.18. Android ID:
A-31495866.
linux_kernel 3.10 CVE-2018 The alarm_timer_nsleep
-13053 function in
kernel/time/alarmtimer.c https://git.kernel.org/pub/
in the Linux kernel scm/linux/kernel/git/tip/ti
through 4.17.3 has an p.git/commit/?id=5f936e
integer overflow via a 19cc0ef97dbe3a56e9498
large relative timeout 922ad5ba1edef
because ktime_add_safe
is not used.
linux_kernel 3.10 CVE-2018 The futex_requeue
-6927 function in kernel/futex.c
in the Linux kernel https://github.com/torval
before 4.14.15 might ds/linux/commit/fbe0e839
allow attackers to cause d1e22d88810f3ee3e2f147
a denial of service 9be4c0aa4a
(integer overflow) or
possibly have unspecified

Page 7
E8372h Firmware Release Notes V1.0 CONFIDENTIAL

other impact by
triggering a negative
wake or requeue value.
linux_kernel 3.10 CVE-2017 The HMAC
-17806 implementation
(crypto/hmac.c) in the
Linux kernel before
4.14.8 does not validate
that the underlying
cryptographic hash
algorithm is unkeyed,
allowing a local attacker
able to use the https://github.com/torval
AF_ALG-based hash ds/linux/commit/af3ff804
interface 5bbf3e32f1a448542e73a
(CONFIG_CRYPTO_US bb4c8ceb6f1
ER_API_HASH) and the
SHA-3 hash algorithm
(CONFIG_CRYPTO_SH
A3) to cause a kernel
stack buffer overflow by
executing a crafted
sequence of system calls
that encounter a missing
SHA-3 initialization.
linux_kernel 3.10 CVE-2017 The
-17558 usb_destroy_configurati
on function in
drivers/usb/core/config.c
in the USB core
subsystem in the Linux
kernel through 4.14.5
does not consider the
maximum number of https://www.spinics.net/li
configurations and sts/linux-usb/msg163644.
interfaces before html
attempting to release
resources, which allows
local users to cause a
denial of service
(out-of-bounds write
access) or possibly have
unspecified other impact
via a crafted USB device.
linux_kernel 3.10 CVE-2017 The raw_sendmsg()
-17712 function in
net/ipv4/raw.c in the
Linux kernel through
4.14.6 has a race https://github.com/torval
condition in ds/linux/commit/8f659a0
inet->hdrincl that leads 3a0ba9289b9aeb9b4470
to uninitialized stack e6fb263d6f483
pointer usage; this
allows a local user to
execute code and gain
privileges.
linux_kernel 3.10 CVE-2014 The https://github.com/torval
-3687 sctp_assoc_lookup_asco ds/linux/commit/b69040d
nf_ack function in 8e39f20d5215a03502a8e
net/sctp/associola.c in 8b4c6ab78395
Page 8
E8372h Firmware Release Notes V1.0 CONFIDENTIAL

the SCTP
implementation in the
Linux kernel through
3.17.2 allows remote
attackers to cause a
denial of service (panic)
via duplicate ASCONF
chunks that trigger an
incorrect uncork within
the side-effect
interpreter.
linux_kernel 3.10 CVE-2016 The sg implementation in
-10088 the Linux kernel through
4.9 does not properly
restrict write operations
in situations where the
KERNEL_DS option is
set, which allows local
users to read or write to
https://github.com/torval
arbitrary kernel memory
ds/linux/commit/128394e
locations or cause a
ff343fc6d2f32172f03e248
denial of service
29539c5835
(use-after-free) by
leveraging access to a
/dev/sg device, related to
block/bsg.c and
drivers/scsi/sg.c. NOTE:
this vulnerability exists
because of an incomplete
fix for CVE-2016-9576.
linux_kernel 3.10 CVE-2012 The
-2136 sock_alloc_send_pskb
function in
net/core/sock.c in the
Linux kernel before 3.4.5
does not properly
https://github.com/torval
validate a certain length
ds/linux/commit/cc9b17a
value, which allows local
d29ecaa20bfe426a8d4db
users to cause a denial of
fb94b13ff1cc
service (heap-based
buffer overflow and
system crash) or possibly
gain privileges by
leveraging access to a
TUN/TAP device.
linux_kernel 3.10 CVE-2014 net/netfilter/nf_conntrack
-2523 _proto_dccp.c in the
Linux kernel through
3.13.6 uses a DCCP
header pointer
incorrectly, which allows
https://github.com/torval
remote attackers to cause
ds/linux/commit/b22f512
a denial of service
6a24b3b2f15448c3f2a25
(system crash) or
4fc10cbc2b92
possibly execute
arbitrary code via a
DCCP packet that
triggers a call to the (1)
dccp_new, (2)
dccp_packet, or (3)
Page 9
E8372h Firmware Release Notes V1.0 CONFIDENTIAL

dccp_error function.
linux_kernel 3.10 CVE-2016 The llc_cmsg_rcv
-4485 function in
net/llc/af_llc.c in the
Linux kernel before 4.5.5
https://github.com/torval
does not initialize a
ds/linux/commit/b8670c0
certain data structure,
9f37bdf2847cc44f36511a
which allows attackers to
53afc6161fd
obtain sensitive
information from kernel
stack memory by reading
a message.
linux_kernel 3.10 CVE-2017 Linux kernel: heap
-1000111 out-of-bounds in
AF_PACKET sockets.
This new issue is
analogous to previously
disclosed
CVE-2016-8655. In both
cases, a socket option
that changes socket state
may race with safety
checks in
packet_set_ring.
Previously with
PACKET_VERSION.
This time with
http://patchwork.ozlabs.o
PACKET_RESERVE.
rg/patch/800274/
The solution is similar:
lock the socket for the
update. This issue may
be exploitable, we did
not investigate further.
As this issue affects
PF_PACKET sockets, it
requires
CAP_NET_RAW in the
process namespace. But
note that with user
namespaces enabled, any
process can create a
namespace in which it
has CAP_NET_RAW.

6 Accessory Product from other Vendor


Version Description
Accessory Product Version:

Page 10
E8372h Firmware Release Notes V1.0 CONFIDENTIAL

6.1 Known Limitations and Issues

7 Others

8 Reference

Page 11

You might also like