In meta/classes/package_ipk.bbclass in Poky in poky-pyro 17.0.0 for Yocto Project through YP Core - Pyro 2.3, attackers can obtain sensitive information by reading a URL in a Source entry in an ipk package.
References
Link | Resource |
---|---|
http://git.yoctoproject.org/cgit/cgit.cgi/poky/patch/?id=f01b909a266498853e6b3f10e6b39f2d95148129 | Mailing List Patch Third Party Advisory |
http://git.yoctoproject.org/cgit/cgit.cgi/poky/patch/?id=f01b909a266498853e6b3f10e6b39f2d95148129 | Mailing List Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.yoctoproject.org/cgit/cgit.cgi/poky/patch/?id=f01b909a266498853e6b3f10e6b39f2d95148129 - Mailing List, Patch, Third Party Advisory |
Information
Published : 2017-06-16 15:29
Updated : 2024-11-21 03:36
NVD link : CVE-2017-9731
Mitre link : CVE-2017-9731
CVE.ORG link : CVE-2017-9731
JSON object : View
Products Affected
yocto_project
- yp_core-pyro
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor