This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--voGkKeMFlj2VNBDISlF1Gg2tdNT1QXfXH
Content-Type: multipart/mixed; boundary="1Ker33V5pwtDxPeevRw1iJL5tnR35ijV4";
protected-headers="v1"
From: Kristian Fiskerstrand
Reply-To: Gentoo Security
To: gentoo-announce@lists.gentoo.org
Message-ID: <27ea2cf4-a5bf-2c5b-f029-b3efd506bdf2@gentoo.org>
Subject: [ GLSA 201706-17 ] Kodi: Multiple vulnerabilities
--1Ker33V5pwtDxPeevRw1iJL5tnR35ijV4
Content-Type: text/plain; charset=utf-8
Content-Language: en-U
Content-Transfer-Encoding: quoted-printable
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201706-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Kodi: Multiple vulnerabilities
Date: June 20, 2017
Bugs: #549342, #619492
ID: 201706-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Kodi, the worst of which
could allow remote attackers to execute arbitrary code.
Background
==========
Kodi (formerly XBMC) is a free and open-source media player software
application.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-tv/kodi < 17.2 >= 17.2
Description
===========
Multiple vulnerabilities have been discovered in Kodi. Please review
the CVE identifiers referenced below for details.
Impact
======
A remote attacker could entice a user to open a specially crafted image
file using Kodi, possibly resulting in a Denial of Service condition.
Furthermore, a remote attacker could entice a user process a specially
crafted ZIP file containing subtitles using Kodi, possibly resulting in
execution of arbitrary code with the privileges of the process or a
Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Kodi users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-tv/kodi-17.2"
References
==========
[ 1 ] CVE-2015-3885
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885
[ 2 ] CVE-2017-8314
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8314
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201706-17
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--1Ker33V5pwtDxPeevRw1iJL5tnR35ijV4--
--voGkKeMFlj2VNBDISlF1Gg2tdNT1QXfXH
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEtOrRIMf4mkrqRycHJQt6/tY3nYUFAllJWR4ACgkQJQt6/tY3
nYVC+gf8CTbns0LVbChw/Jl65M/wo3AJiSPw+fasUGbeuKTc/S2S8Id4WIO9QE27
XKO38NBCQMdhUDYri4G7hFBSFO5hT4dGqrRsTQAeb2VJ5ESTdA0qr7ZWjukxjdq2
sWcROlUCBYj2HzEqYLVEPNGwu588OWnUkx+3L7n+kwJVjGYdQpUfklDh50RnFOYL
n8NONPuSFMKfhx/h/v89X2lLdmiM1c2PS7pBQR7axukFT8zBUezvIbNEbWl/XtJw
NwcZX3rZrevBWZaKRrFUqtxnn7LFfQ2Q9l+9NjevSGACgil5//Gm9Y5nmIyjod6H
D+/7Vhv+jo0VxBcYZCGvxBDR6mL8SA==
=Ft7c
-----END PGP SIGNATURE-----
--voGkKeMFlj2VNBDISlF1Gg2tdNT1QXfXH--
|