– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201706-17
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Severity: Normal
Title: Kodi: Multiple vulnerabilities
Date: June 20, 2017
Bugs: #549342, #619492
ID: 201706-17
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Synopsis
========
Multiple vulnerabilities have been found in Kodi, the worst of which
could allow remote attackers to execute arbitrary code.
Background
==========
Kodi (formerly XBMC) is a free and open-source media player software
application.
Affected packages
=================
——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 media-tv/kodi < 17.2 >= 17.2
Description
===========
Multiple vulnerabilities have been discovered in Kodi. Please review
the CVE identifiers referenced below for details.
Impact
======
A remote attacker could entice a user to open a specially crafted image
file using Kodi, possibly resulting in a Denial of Service condition.
Furthermore, a remote attacker could entice a user process a specially
crafted ZIP file containing subtitles using Kodi, possibly resulting in
execution of arbitrary code with the privileges of the process or a
Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Kodi users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=media-tv/kodi-17.2”
References
==========
[ 1 ] CVE-2015-3885
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885
[ 2 ] CVE-2017-8314
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8314
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201706-17
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
—–BEGIN PGP SIGNATURE—–
iQEzBAEBCgAdFiEEtOrRIMf4mkrqRycHJQt6/tY3nYUFAllJWR4ACgkQJQt6/tY3
nYVC+gf8CTbns0LVbChw/Jl65M/wo3AJiSPw+fasUGbeuKTc/S2S8Id4WIO9QE27
XKO38NBCQMdhUDYri4G7hFBSFO5hT4dGqrRsTQAeb2VJ5ESTdA0qr7ZWjukxjdq2
sWcROlUCBYj2HzEqYLVEPNGwu588OWnUkx+3L7n+kwJVjGYdQpUfklDh50RnFOYL
n8NONPuSFMKfhx/h/v89X2lLdmiM1c2PS7pBQR7axukFT8zBUezvIbNEbWl/XtJw
NwcZX3rZrevBWZaKRrFUqtxnn7LFfQ2Q9l+9NjevSGACgil5//Gm9Y5nmIyjod6H
D+/7Vhv+jo0VxBcYZCGvxBDR6mL8SA==
=Ft7c
—–END PGP SIGNATURE—–