WIND RIVER SECURITY CENTER
Wind River is committed to active threat monitoring, rapid assessment, proactive customer notification, and timely fixes. This page brings together useful resources to help you navigate an evolving threat landscape.
cve Resources
Access our searchable database of Common Vulnerabilities and Exposures (CVEs).
Recent CVEs
- CVE-2019-12256 | 2019-07-29
IPNET security vulnerability: Stack overflow in the parsing of IPv4 packets’ IP options
- CVE-2019-12257 | 2019-07-29
IPNET security vulnerability: Heap overflow in DHCP Offer/ACK parsing inside ipdhcpc
- CVE-2019-12255 | 2019-07-29
IPNET security vulnerability: TCP Urgent Pointer = 0 leads to integer underflow
- CVE-2019-12260 | 2019-07-29
IPNET security vulnerability: TCP Urgent Pointer state confusion caused by malformed TCP AO option
SEARCH FOR PATCHES
Find and access all of
our patches in our
Product Documentation
public release keys
Wind River protocol includes the use of PGP keys to sign our software. Use this public release key to sign content from your project:
LinuxVulnerability Notices
Wind River® is committed to active threat monitoring, rapid assessment and prioritization, proactive customer notification, and timely fixes. Check out the remediation information on some of the latest security vulnerabilities.
REPORT A VULNERABILITY
If you have information about a security issue or vulnerability with a Wind River product or technology, you can report the issue below.
A member of the Wind River security team will review your submission and work with you in resolving the issue.