All customers except US A&D: to ensure that you can access all of your product downloads, you must log in to the Wind River Delivers portal and visit the My Products page to force an initial sync of your product entitlement. Only after you’ve completed this step will you be able to access and download product content through the Artifacts, Registry, and Git interfaces. This also applies to users attempting to run the Wind River installer in maintenance or update mode or Linux installation updates at the command line.

Wind River Support Network


SCP7-416 : Security Advisory - linux - CVE-2016-4997

Created: Jun 29, 2016    Updated: Sep 8, 2018
Resolved Date: Aug 10, 2016
Found In Version:
Fix Version:
Severity: Standard
Applicable for: Wind River Linux 7
Component/s: Kernel


A flaw was discovered in processing setsockopt for 32 bit processes on
64 bit systems.  This flaw will allow attackers to alter arbitary kernel
memory when unloading a kernel module.  This action is usually restricted
to root-priveledged users but can also be leveraged if the kernel is
compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated priveledges.

This flaw was introduced in commit 52e804c6dfaa,

Upstream fixes

Discussion on oss-sec: 

Other Downloads

Live chat