Kodi: Arbitrary code execution

2017-10-22T00:00:00
ID GLSA-201710-21
Type gentoo
Reporter Gentoo Foundation
Modified 2017-10-22T00:00:00

Description

Background

Kodi is a free and open source media-center and entertainment hub previously known as XBMC.

Description

Kodi is vulnerable due to shipping with an embedded version of UnRAR. Please review the referenced CVE identifier for details.

Impact

A remote attacker, by enticing a user to process a specifically crafted RAR file, could execute arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All Kodi users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=media-tv/kodi-17.3-r1"