All customers except US A&D: to ensure that you can access all of your product downloads, you must log in to the Wind River Delivers portal https://delivers.windriver.com and visit the My Products page to force an initial sync of your product entitlement. Only after you’ve completed this step will you be able to access and download product content through the Artifacts, Registry, and Git interfaces. This also applies to users attempting to run the Wind River installer in maintenance or update mode or Linux installation updates at the command line.

Wind River Support Network

HomeDefectsSCP7-232
Fixed

SCP7-232 : Security Advisory - linux - CVE-2015-8215

Created: Nov 29, 2015    Updated: Sep 8, 2018
Resolved Date: Dec 6, 2015
Found In Version: 7.0.0.11
Fix Version: 7.0.0.12
Severity: Standard
Applicable for: Wind River Linux 7
Component/s: Kernel

Description

net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272.  NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8215

Other Downloads


Live chat
Online