These vulnerabilities may occur in Wind River–developed products or in execution environments in which Wind River products operate. Wind River is committed to active threat monitoring, rapid assessment and threat prioritization, proactive customer notification, and timely remediation.
Notice | Summary | Products | Requirement | Release Date | Last Modify Date |
---|---|---|---|---|---|
The leap second handling in WRLinux (update 07/22/2015) | The leap second handling in WRLinux | Linux Platforms 2.0 | Recommended | Feb 9, 2015 | Jul 22, 2015 |
Wind River Linux Mid-Sep 2013 Security Bulletin | Wind River Linux Mid-Sep 2013 Security Bulletin | Linux Platforms 2.0 | Recommended | Mar 5, 2012 | Sep 16, 2013 |