Embedded Systems
A TIMESYS DEEP DIVE
February 2024
WHAT’S INSIDE
- Cybersecurity news: Critical Alert: “Leaky Vessels” Vulnerability Threatens Container Isolation Across Docker and runc
- Secure Your Future: Master the Cyber Resilience Act with Long Term Linux OS and BSP Maintenance
- LYNX MOSA.ic: Where Open Source Meets Unmatched Security and Efficiency
- VigiShield: The Key to Secure, Swift Development on TI Sitara AM 625x
- Learn with Timesys: Everything You Should Know About KEVs & How They Differ From CVEs
- Upcoming: Events Around The World You Don’t Want To Miss!
Cybersecurity in the news
Critical Alert: “Leaky Vessels” Vulnerability Threatens Container Isolation Across Docker and runc
This month, three critical vulnerabilities have emerged, posing significant threats to embedded software platforms and Linux distributions. These vulnerabilities, if exploited, could allow attackers to bypass security measures, gain unauthorized access, and potentially take control of affected systems. Immediate action is recommended to mitigate these risks.
Leaky Vessels: Escaping Docker and runc Containers
A series of vulnerabilities collectively known as “Leaky Vessels” have been identified, allowing attackers to escape Docker and runc containers. Discovered by Snyk’s security researchers, these flaws can enable unauthorized access to the host operating system, compromising the security of the entire system. The vulnerabilities affect a wide range of container management software, making swift patching essential.
- CVE-2024-21626: An order-of-operations flaw with significant implications.
- CVE-2024-23651: A race condition within Buildkit’s mount cache handling.
- CVE-2024-23652 & CVE-2024-23653: Additional flaws leading to potential data manipulation and unauthorized access.
Elevating Privileges: glibc Flaw in Linux Distributions
CVE-2023-6246, a newly disclosed vulnerability within the GNU C Library (glibc), allows unprivileged attackers to gain root access across multiple major Linux distributions. This local privilege escalation vulnerability stems from a heap-based buffer overflow, highlighting the need for immediate system updates to prevent potential exploits.
Affected distributions include Debian, Ubuntu, and Fedora, with the possibility of broader impact across other Linux systems.
Shim Bootloader Vulnerability: CVE-2023-40547
The discovery of CVE-2023-40547 in the shim bootloader—a critical component in the Linux boot process supporting Secure Boot—has raised alarms. This vulnerability can lead to complete system compromise before the kernel loads, offering attackers a high level of control over the affected systems.
This issue not only affects Red Hat but has widespread implications for all Linux distributions that support Secure Boot. Immediate updates to the UEFI Secure Boot DBX and the shim software are crucial to protect against potential exploits.
CVE-2023-40546 to CVE-2023-40551: Accompanying vulnerabilities with medium severity, also requiring attention.
With an average of 420 new CVEs every week, how do you cut through the noise and take action on the vulnerabilities that pose the largest threat to your device?
We launched the Timesys CVE Dashboard and update it weekly with details on the dangerous security vulnerabilities that could be affecting your device.

Secure Your Future
Master the Cyber Resilience Act with Long Term Linux OS and BSP Maintenance
In the face of the European Cyber Resilience Act’s stringent cybersecurity demands, medical device manufacturers are finding themselves at a crossroads. Achieving and maintaining compliance requires a proactive, knowledgeable partner. Enter Timesys, your ally in navigating these complex regulations with our Long Term Linux OS and BSP Maintenance service.
Why Choose Long Term OS and BSP Maintenance?
- Stay Ahead of Regulations: Continuous updates ensure your devices remain compliant, without the overhead of constant vigilance.
- Expert Support: Leverage our two decades of embedded software expertise to secure your devices against evolving threats.
- Cost-Effective Solution: Minimize the risk of penalties and reduce the need for in-house security experts, allowing you to focus on innovation.
Transform compliance from a challenge into your competitive advantage. Visit our product page to learn how our service can simplify your path to CRA compliance and beyond.
Elevate Your IT Infrastructure
LYNX MOSA.ic: Where Open Source Meets Unmatched Security and Efficiency

– MOSA.ic’s architecture supports a variety of operating systems, enabling simplified software stack complexity and rapid development.
See how LYNX MOSA.ic combines open source flexibility with unparalleled security and efficiency.
Elevate Your Embedded Security and Performance
VigiShield: The Key to Secure, Swift Development on TI Sitara AM 625x

Navigating the complexities of embedded system security can be daunting, especially when your innovation hinges on the advanced capabilities of the TI Sitara AM 625x. With cyber threats evolving at an unprecedented pace, ensuring your project’s integrity while maintaining a swift development cycle is a challenge many face.
Introducing VigiShield by Timesys – your solution to embedding uncompromised security directly into your development process. VigiShield leverages the power of the TI Sitara AM 625x to offer:
- Custom-Fit Security Solutions: Seamlessly integrate robust security that complements the performance of your TI Sitara AM 625x projects without the complexity.
- Streamlined Compliance: Meet industry standards effortlessly, ensuring your product’s market readiness.
- Accelerated Innovation: Focus on what you do best, while we secure your back.
Take the first step: Dive into a secure future with an exclusive VigiShield security consultation web meeting. Secure, innovate, and lead with confidence.
Explore VigiShield Now – Your blueprint for secure and innovative embedded solutions.
Learn with Timesys
Everything You Should Know About KEVs & How They Differ From CVEs

Why should KEVs demand your immediate attention, and how do they differ from the CVEs you’re already familiar with? Uncover the nuances that set KEVs apart and the real threats they pose to embedded Linux, Yocto, and medical devices. With our expert guide, you’ll learn the best practices for detecting, mitigating, and ultimately enhancing your device security against these exploited vulnerabilities. Dive into the full discussion to prioritize your security efforts effectively.
Discover how to fortify your devices against KEVs. Read our comprehensive guide now and take a proactive stance in securing your technology for the future:
Upcoming
Events Around The World You Don’t Want To Miss

NVIDIA GTC 2024: AI Conference & Expo
When? Monday, March 18 to Thursday, March 21
Where? At the San Jose Convention Center (San Jose, CA, USA) and Virtually
Come connect with a dream team of industry luminaries, developers, researchers, and business strategists helping shape what’s next in AI and accelerated computing. At this year’s NVIDIA GTC, there will be over 900 inspiring sessions, 300+ exhibits, 20+ technical workshops covering generative AI, and Timesys and Lynx Software Technologies!
Aerospace TechWeek Europe
When? Wednesday, April 17 to Thursday, April 18
Where? In Hall 4, MOC Event Center Messe München in Munich, Germany
Don’t miss this exciting opportunity for avionics, airlines, aircraft makers, and their partners to connect, innovate, and discover new ways of generating solutions in our rapidly evolving world. In addition, our Director of EMEA Open Source and Commercial Programs at Timesys, Maciej Halasz, and our CEO, Michel Genard, will be guest speakers at this event!

Vulnerability Management for Embedded
Tools & Techniques to Monitor and Remediate Vulnerabilities in Your SBOM

March 28 @ 12 PM EDT / 9 AM PT
In this monthly live webinar and Q&A session, you’ll learn essential ways to avoid a five-figure mistake along with:
– Why you need to manage your open-source software risks
– How to generate an accurate SBOM (Software Bills of Materials) and why it matters
– Tools and techniques to monitor and remediate vulnerabilities in your SBOM
– And much more!
Learn More
October 2023