Wind River® is committed to delivering secure, reliable products that keep your devices protected. As part of this commitment, our Security Response Team is constantly monitoring and assessing thousands of notifications from CERT-accepted authorities and agencies, Linux security communities such as oss-security, and our customers. Wind River prioritizes these notifications, responds, and proactively contacts customers for timely alerts, enabling them to secure their devices.
We have determined that some Wind River products are affected, including the following:
- Wind River Linux
- Wind River Intelligent Device Platform
- Wind River Pulsar™ Linux
Customers not on the latest version of software may be vulnerable and should contact Wind River Customer Support or their local Wind River representative for information regarding a fix for their version.
This issue has been rated as high. Further information can be found on https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash.
Note: Due to the significant difference in the privilege model, VxWorks™ is not impacted by this vulnerability. Specifically, in VxWorks all real-time processes (RTPs) execute in user mode (least privileged processor execution mode), and the concepts of SUID (set-user-ID) and SGID (set-group-ID) processes do not exist. VxWorks is highly configurable, and if you are concerned about the potential of a “stack clash” scenario, VxWorks provides configuration parameters to specify the size of various stack guard regions, including the overflow and underflow regions for an RTP task’s execution stack, the overflow region for an RTP task’s exception stack, and the overflow and underflow regions for a kernel task’s execution stack. Contact Customer Support or your Wind River representative for more information on these configuration options.
Wind River has released hot patches for all affected Wind River products.
We continue to monitor the situation on our security mailing lists in case there are new developments, and will post periodic updates via RSS feeds and the Wind River Support Network.