All customers except US A&D: to ensure that you can access all of your product downloads, you must log in to the Wind River Delivers portal and visit the My Products page to force an initial sync of your product entitlement. Only after you’ve completed this step will you be able to access and download product content through the Artifacts, Registry, and Git interfaces. This also applies to users attempting to run the Wind River installer in maintenance or update mode or Linux installation updates at the command line.

Wind River Support Network


LIN9-2923 : Security Advisory - openssh - CVE-2016-10009

Created: Jan 8, 2017    Updated: Dec 3, 2018
Resolved Date: Jan 18, 2017
Found In Version:
Fix Version:
Severity: Standard
Applicable for: Wind River Linux 9
Component/s: Userspace


It was found that ssh-agent could load PKCS#11 modules from paths outside of a trusted whitelist. An attacker able to load a crafted PKCS#11 module across a forwarded agent channel could potentially use this flaw to execute arbitrary code on the system running the ssh-agent. Note that the attacker must have control of the forwarded agent-socket and the ability to write to the filesystem of the host running ssh-agent.

This issue was fixed by only allowing the loading of module from a trusted (and configurable) whitelist.

CVE assignment:

Upstream patch:

Other Downloads


Live chat