Line 6: |
Line 6: |
| | latest_fw = RUT9M_R_00.07.02.7 | | | latest_fw = RUT9M_R_00.07.02.7 |
| | latest_date = 2022.09.12 | | | latest_date = 2022.09.12 |
− | | latest_md5 = aea897b9a7f49b2fc0d8e237873a6247 | + | | latest_md5 = b2058648ec51566e6c37735d65bbe357 |
| <!-----------------------FACTORY FW--------------------> | | <!-----------------------FACTORY FW--------------------> |
− | | factory_fw = RUT9M_R_00.07.02.4 | + | | factory_fw = RUT9M_R_00.07.02.7 |
− | | factory_date = 2022.07.20 | + | | factory_date = 2022.09.12 |
− | | factory_md5 = 913670d67dfd98e8698ec120f2f18772 | + | | factory_md5 = b2058648ec51566e6c37735d65bbe357 |
| }} | | }} |
| | | |
Line 25: |
Line 25: |
| ** Fixed CVE-2022-37434 kernel vulnerability | | ** Fixed CVE-2022-37434 kernel vulnerability |
| ** Fixed interface option reset after VLAN ID change | | ** Fixed interface option reset after VLAN ID change |
− | ** Removed memory leak on port | + | ** Removed memory leak on port events |
| ** Fixed WiFi Scanner out of range crash when iterating collected data | | ** Fixed WiFi Scanner out of range crash when iterating collected data |
| | | |