First published: Fri Jun 16 2017(Updated: )
In meta/classes/package_ipk.bbclass in Poky in poky-pyro 17.0.0 for Yocto Project through YP Core - Pyro 2.3, attackers can obtain sensitive information by reading a URL in a Source entry in an ipk package.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yocto Project | =2.3 |
http://git.yoctoproject.org/cgit/cgit.cgi/poky/patch/?id=f01b909a266498853e6b3f10e6b39f2d95148129
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9731 is considered to have a low severity, allowing attackers to obtain sensitive information.
To fix CVE-2017-9731, upgrade to a version of the Yocto Project that addresses this vulnerability.
CVE-2017-9731 affects Yocto Project version 2.3 specifically.
CVE-2017-9731 allows attackers to read sensitive information contained in a URL in a Source entry of an ipk package.
Yes, the direct link to the patch for CVE-2017-9731 is available in the Yocto Project repository.