Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Zwei Probleme in Kodi
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in Kodi
ID: 201706-17
Distribution: Gentoo
Plattformen: Keine Angabe
Datum: Di, 20. Juni 2017, 22:51
Referenzen: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8314

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--voGkKeMFlj2VNBDISlF1Gg2tdNT1QXfXH
Content-Type: multipart/mixed;
boundary="1Ker33V5pwtDxPeevRw1iJL5tnR35ijV4";
protected-headers="v1"
From: Kristian Fiskerstrand <k_f@gentoo.org>
Reply-To: Gentoo Security <security@gentoo.org>
To: gentoo-announce@lists.gentoo.org
Message-ID: <27ea2cf4-a5bf-2c5b-f029-b3efd506bdf2@gentoo.org>
Subject: [ GLSA 201706-17 ] Kodi: Multiple vulnerabilities

--1Ker33V5pwtDxPeevRw1iJL5tnR35ijV4
Content-Type: text/plain; charset=utf-8
Content-Language: en-U
Content-Transfer-Encoding: quoted-printable

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201706-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Kodi: Multiple vulnerabilities
Date: June 20, 2017
Bugs: #549342, #619492
ID: 201706-17

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in Kodi, the worst of which
could allow remote attackers to execute arbitrary code.

Background
==========

Kodi (formerly XBMC) is a free and open-source media player software
application.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-tv/kodi < 17.2 >= 17.2

Description
===========

Multiple vulnerabilities have been discovered in Kodi. Please review
the CVE identifiers referenced below for details.

Impact
======

A remote attacker could entice a user to open a specially crafted image
file using Kodi, possibly resulting in a Denial of Service condition.

Furthermore, a remote attacker could entice a user process a specially
crafted ZIP file containing subtitles using Kodi, possibly resulting in
execution of arbitrary code with the privileges of the process or a
Denial of Service condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Kodi users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=media-tv/kodi-17.2"

References
==========

[ 1 ] CVE-2015-3885
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885
[ 2 ] CVE-2017-8314
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8314

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201706-17

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5


--1Ker33V5pwtDxPeevRw1iJL5tnR35ijV4--

--voGkKeMFlj2VNBDISlF1Gg2tdNT1QXfXH
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEtOrRIMf4mkrqRycHJQt6/tY3nYUFAllJWR4ACgkQJQt6/tY3
nYVC+gf8CTbns0LVbChw/Jl65M/wo3AJiSPw+fasUGbeuKTc/S2S8Id4WIO9QE27
XKO38NBCQMdhUDYri4G7hFBSFO5hT4dGqrRsTQAeb2VJ5ESTdA0qr7ZWjukxjdq2
sWcROlUCBYj2HzEqYLVEPNGwu588OWnUkx+3L7n+kwJVjGYdQpUfklDh50RnFOYL
n8NONPuSFMKfhx/h/v89X2lLdmiM1c2PS7pBQR7axukFT8zBUezvIbNEbWl/XtJw
NwcZX3rZrevBWZaKRrFUqtxnn7LFfQ2Q9l+9NjevSGACgil5//Gm9Y5nmIyjod6H
D+/7Vhv+jo0VxBcYZCGvxBDR6mL8SA==
=Ft7c
-----END PGP SIGNATURE-----

--voGkKeMFlj2VNBDISlF1Gg2tdNT1QXfXH--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung