All customers except US A&D: to ensure that you can access all of your product downloads, you must log in to the Wind River Delivers portal https://delivers.windriver.com and visit the My Products page to force an initial sync of your product entitlement. Only after you’ve completed this step will you be able to access and download product content through the Artifacts, Registry, and Git interfaces. This also applies to users attempting to run the Wind River installer in maintenance or update mode or Linux installation updates at the command line.

Wind River Support Network

HomeDefectsLIN9-2925
Fixed

LIN9-2925 : Security Advisory - openssh - CVE-2016-10012

Created: Jan 8, 2017    Updated: Dec 3, 2018
Resolved Date: Jan 18, 2017
Found In Version: 9.0.0.3
Fix Version: 9.0.0.3
Severity: Standard
Applicable for: Wind River Linux 9
Component/s: Userspace

Description

It was found that the shared memory manager used by pre-authentication compression support had a bounds checks that could be elided by some optimising compilers. Additionally, this memory manager was incorrectly accessible when pre-authentication compression was disabled. This could potentially allow attacks against the privileged monitor process from the sandboxed privilege-separation process (a compromise of the latter would be required first).

CVE assignment:

http://seclists.org/oss-sec/2016/q4/708

External References:

https://www.openssh.com/txt/release-7.4


Upstream patches:

http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/monitor.c.diff?r1=1.165&r2=1.166
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/monitor.h.diff?r1=1.19&r2=1.20

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10012

Other Downloads


CVEs


Live chat
Online