You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa Kodi

Sigurnosni nedostaci programskog paketa Kodi

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LGE

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201706-17
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: Kodi: Multiple vulnerabilities
Date: June 20, 2017
Bugs: #549342, #619492
ID: 201706-17

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

Multiple vulnerabilities have been found in Kodi, the worst of which
could allow remote attackers to execute arbitrary code.

Background
==========

Kodi (formerly XBMC) is a free and open-source media player software
application.

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 media-tv/kodi < 17.2 >= 17.2

Description
===========

Multiple vulnerabilities have been discovered in Kodi. Please review
the CVE identifiers referenced below for details.

Impact
======

A remote attacker could entice a user to open a specially crafted image
file using Kodi, possibly resulting in a Denial of Service condition.

Furthermore, a remote attacker could entice a user process a specially
crafted ZIP file containing subtitles using Kodi, possibly resulting in
execution of arbitrary code with the privileges of the process or a
Denial of Service condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Kodi users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=media-tv/kodi-17.2”

References
==========

[ 1 ] CVE-2015-3885
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885
[ 2 ] CVE-2017-8314
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8314

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201706-17

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEEtOrRIMf4mkrqRycHJQt6/tY3nYUFAllJWR4ACgkQJQt6/tY3
nYVC+gf8CTbns0LVbChw/Jl65M/wo3AJiSPw+fasUGbeuKTc/S2S8Id4WIO9QE27
XKO38NBCQMdhUDYri4G7hFBSFO5hT4dGqrRsTQAeb2VJ5ESTdA0qr7ZWjukxjdq2
sWcROlUCBYj2HzEqYLVEPNGwu588OWnUkx+3L7n+kwJVjGYdQpUfklDh50RnFOYL
n8NONPuSFMKfhx/h/v89X2lLdmiM1c2PS7pBQR7axukFT8zBUezvIbNEbWl/XtJw
NwcZX3rZrevBWZaKRrFUqtxnn7LFfQ2Q9l+9NjevSGACgil5//Gm9Y5nmIyjod6H
D+/7Vhv+jo0VxBcYZCGvxBDR6mL8SA==
=Ft7c
—–END PGP SIGNATURE—–

AutorVlatka Misic
Cert idNCERT-REF-2017-06-0002-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa exim

Otkriven je sigurnosni nedostatak u programskom paketu exim za operacijski sustav openSUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje "stack crash"...

Close