All customers except US A&D: to ensure that you can access all of your product downloads, you must log in to the Wind River Delivers portal https://delivers.windriver.com and visit the My Products page to force an initial sync of your product entitlement. Only after you’ve completed this step will you be able to access and download product content through the Artifacts, Registry, and Git interfaces. This also applies to users attempting to run the Wind River installer in maintenance or update mode or Linux installation updates at the command line.

Wind River Support Network

HomeDefectsLIN9-3618
Fixed

LIN9-3618 : CLONE - Security Advisory - ntp - CVE-2017-6463

Created: Mar 22, 2017    Updated: May 29, 2018
Resolved Date: Apr 10, 2018
Found In Version: 9.0.0.4
Fix Version: 9.0.0.6
Severity: Standard
Applicable for: Wind River Linux 9
Component/s: Userspace

Description

http://support.ntp.org/bin/view/Main/NtpBug3119

Ntpd does not enable trap service by default. If trap service has been explicitly enabled, an attacker can send a specially crafted packet to cause a null pointer dereference that will crash ntpd, resulting in a denial of service.

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9311

CVEs


Live chat
Online