Home Tags Buffer Overflow

Tag: Buffer Overflow

VU#676632: IBM Lotus Domino server mailbox name stack buffer overflow

The IBM Lotus Domino server IMAP service contains a stack-based buffer overflow vulnerability in IMAP commands that refer to a mailbox name.

This can allow a remote,authenticated attacker to execute arbitrary code with the privileges of the Domino server

VU#214283: Commvault Edge contains a buffer overflow vulnerability

Commvault Edge,version 11 SP6(11.80.50.0),is vulnerable to a stack-based buffer overflow vulnerability.

VU#305448: D-Link DIR-850L web admin interface contains a stack-based buffer overflow...

D-Link DIR-850L,firmware versions 1.14B07,2.07.B05,and possibly others,contains a stack-based buffer overflow vulnerability in the web administration interface HNAP service. Other models may also be affected.

Vulnerability in Microsoft SMBv3 protocol crashes Windows PCs

Security experts warn that it may be possible to exploit a vulnerability in a protocol widely used to connect Windows clients and servers to inject and execute malicious code on Windows computers.Computers running fully patched Windows 10, 8.1, Server 2012, or 2016  that try to access an infected server will crash with a Blue Screen triggered in mrxsmb20.sys, according to a post by Günter Born on today's Born’s Tech and Windows World blog.[ Also from InfoWorld: The 10 Windows group policy settings you need to get right. | Survive and thrive with the new OS: The ultimate Windows 10 survivor kit. | Stay up on key Microsoft technologies with the Windows newsletter. ]The vulnerability takes advantage of a buffer overflow bug in Microsoft’s SMBv3 routines.
SMBv3 is the latest version of the protocol used to connect Windows clients and servers for sharing files and printers.To read this article in full or to leave a comment, please click here

Flaws Found in Popular Printer Models

Researchers have found a half-dozen flaws in popular printer models that allow attackers to do everything from steal print jobs to conduct buffer overflow attacks.

Apple Releases First IOS and macOS Security Updates for 2017

Apple issues its first security updates of 2017, fixing 18 security vulnerabilities in IOS and 11 security issues in macOS. Apple released its first operating system updates of 2017 on Jan. 23, with the debut of macOS 10.12.3 on the desktop and IOS 10....

Apple Patches Critical Kernel Vulnerabilities

Apple today released new versions of iOS and macOS Sierra and addressed some overlapping code execution vulnerabilities in both its mobile and desktop operating systems. The updates were part of a bigger release of security updates from Apple that also included Safari, iCloud for Windows, and watchOS. The most critical of the bugs were a pair of kernel vulnerabilities, CVE-2017-2370 and CVE-2017-2360, which could allow a malicious application to execute code with the highest kernel privileges.

The two bugs, a buffer overflow and use-after-free vulnerability, were reported by Google Project Zero’s Ian Beer and were patched in iOS 10.2.1 and macOS Sierra 10.12.3. A critical libarchive buffer overflow vulnerability, CVE-2016-8687, was also patched in iOS and macOS Sierra. “Unpacking a maliciously crafted archive may lead to arbitrary code execution,” Apple said. Apple also patched 11 vulnerabilities in the iOS implementation of WebKit, a half-dozen of which lead to arbitrary code execution, while three others attackers could abuse with crafted web content to exfiltrate data cross-origin. Many of the same Webkit vulnerabilities were also patched in Safari, which was updated to version 10.0.3. Rounding out the iOS update, Apple patched a flaw in Auto Unlock that could unlock when Apple Watch is off the user’s wrist, along with an issue that could crash the Contacts application, and another Wi-Fi issue that could show a user’s home screen even if the device is locked. The macOS Sierra update also patched code execution vulnerabilities in other components, including its Bluetooth implementation and Graphics Drivers (code execution with kernel privileges), Help Viewer, and the Vim text editor. The Safari update also patched a vulnerability in the address bar, CVE-2017-2359, that could be exploited if visiting a malicious website, allowing an attacker to spoof the URL. tvOS was updated to version 10.1.1, and the same kernel, libarchive and webkit vulnerabilities present in iOS were patched in the Apple TV OS (4th generation). The watchOS update, 3.1.3, was a sizable one as well with patches for 33 CVEs, including 17 code execution vulnerability. The iCloud for Windows 6.1.1 update, for Windows 7 and later, also patched four Webkit vulnerabilities addressed in other product updates, all off which lead to arbitrary code execution.

JSA10774 – 2017-01 Security Bulletin: Network and Security Manager (NSM): Multiple...

2017-01 Security Bulletin: Network and Security Manager (NSM): Multiple OpenSSH vulnerabilities affect NSM Appliance OS.Product Affected:NSM Appliances (NSM3000, NSM4000 and NSMExpress). Problem: Multiple OpenSSH software vulnerabilities affect NSM App...

JSA10770 – 2017-01 Security Bulletin: Junos Space: Multiple vulnerabilities resolved in...

CVE CVSS base score Summary CVE-2016-1762 9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) The xmlNextChar function in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document. CVE-2016-444...

JSA10774 – 2017-01 Security Bulletin: Network and Security Manager (NSM): Multiple...

CVE CVSS base score Summary CVE-2015-5600 6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices withi...

RHSA-2017:0021-1: Moderate: gstreamer1-plugins-bad-free security update

An update for gstreamer1-plugins-bad-free is now available for Red HatEnterprise Linux 7.Red Hat Product Security has rated this update as having a security impact ofModerate.

A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. GStreamer is a streaming media framework based on graphs of filters whichoperate on media data.

The gstreamer1-plugins-bad-free package contains acollection of plug-ins for GStreamer.Security Fix(es):* An integer overflow flaw, leading to a heap-based buffer overflow, was foundin GStreamer's VMware VMnc video file format decoding plug-in.

A remote attackercould use this flaw to cause an application using GStreamer to crash or,potentially, execute arbitrary code with the privileges of the user running theapplication. (CVE-2016-9445)* Multiple flaws were discovered in GStreamer's H.264 and MPEG-TS plug-ins.

Aremote attacker could use these flaws to cause an application using GStreamer tocrash. (CVE-2016-9809, CVE-2016-9812, CVE-2016-9813) Red Hat Enterprise Linux Desktop (v. 7) SRPMS: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.src.rpm     MD5: f1b972e24d2f83fd00c12822762699bbSHA-256: 669aba86bc3d4c4c83de25943b744dcb41f0177dc39df3c86c42fa6ef684dbbd   x86_64: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.i686.rpm     MD5: e782a667ebd7f35fb60869baec47f7c1SHA-256: e7b92af47a3b2dd40768fbabcc03b3c4b204e03149374353e14a6a78893801ad gstreamer1-plugins-bad-free-1.4.5-6.el7_3.x86_64.rpm     MD5: 02d0dcd8176440cf10640bc78481b1a2SHA-256: eaf7c7c7496bd8b3c81fc6be1e13532b3bc8a84dde99b5b791bdfc4e4290feb0 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.i686.rpm     MD5: 6f6f3e66fb3d78dcd87d9806ef51a2d2SHA-256: 1b367db491279cbfe51c38510345a81fe43b87972b7718181708d0c1b3ac8d12 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.x86_64.rpm     MD5: a7aafcdabe0b3a795f804a3fa6235ce3SHA-256: badb1e0b6d218fe587cfc1b56f2b157b2408b5f4ffe4e8d683df6ecc1350e2da gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.i686.rpm     MD5: a438a6b2b63503ebab7d838d992567aaSHA-256: 661cc4a4d9bb10ea2ab239301f33fc00e4b0219ce6a15780a053c64ac469c191 gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.x86_64.rpm     MD5: 1ca7168a7b88718a89e3b8be770c15e4SHA-256: fd0ea8e920f7c3c83e1fa533b9ca73a75842e635e2232392d362c1f91d675a9c   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.src.rpm     MD5: f1b972e24d2f83fd00c12822762699bbSHA-256: 669aba86bc3d4c4c83de25943b744dcb41f0177dc39df3c86c42fa6ef684dbbd   x86_64: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.i686.rpm     MD5: e782a667ebd7f35fb60869baec47f7c1SHA-256: e7b92af47a3b2dd40768fbabcc03b3c4b204e03149374353e14a6a78893801ad gstreamer1-plugins-bad-free-1.4.5-6.el7_3.x86_64.rpm     MD5: 02d0dcd8176440cf10640bc78481b1a2SHA-256: eaf7c7c7496bd8b3c81fc6be1e13532b3bc8a84dde99b5b791bdfc4e4290feb0 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.i686.rpm     MD5: 6f6f3e66fb3d78dcd87d9806ef51a2d2SHA-256: 1b367db491279cbfe51c38510345a81fe43b87972b7718181708d0c1b3ac8d12 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.x86_64.rpm     MD5: a7aafcdabe0b3a795f804a3fa6235ce3SHA-256: badb1e0b6d218fe587cfc1b56f2b157b2408b5f4ffe4e8d683df6ecc1350e2da gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.i686.rpm     MD5: a438a6b2b63503ebab7d838d992567aaSHA-256: 661cc4a4d9bb10ea2ab239301f33fc00e4b0219ce6a15780a053c64ac469c191 gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.x86_64.rpm     MD5: 1ca7168a7b88718a89e3b8be770c15e4SHA-256: fd0ea8e920f7c3c83e1fa533b9ca73a75842e635e2232392d362c1f91d675a9c   Red Hat Enterprise Linux Server (v. 7) SRPMS: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.src.rpm     MD5: f1b972e24d2f83fd00c12822762699bbSHA-256: 669aba86bc3d4c4c83de25943b744dcb41f0177dc39df3c86c42fa6ef684dbbd   PPC: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.ppc.rpm     MD5: e3bca4a0e1cc38fc8f580daf7165e7f9SHA-256: 931bcdf7b4c0157708b1fa50d08c6326d5344a9759d13b38fbe2d9351950a695 gstreamer1-plugins-bad-free-1.4.5-6.el7_3.ppc64.rpm     MD5: 0f4e168aff3ee3c332bbb56b0ea774d8SHA-256: c09c600e6ef411d7bf0874bb2ec4208d491f689310d15ae9994df22e57439bc2 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.ppc.rpm     MD5: ad19ac9152072d491661878fb1320d3bSHA-256: fd7792162018dbaaf67efff86b3d128465bf0cf75063aa3c08257e844b5c1a06 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.ppc64.rpm     MD5: 147963cb10716f990af18351ec87c737SHA-256: f3e34884e05a5df19b6f89b04c52fa7f74f4e1a6d33f04a3917ba1ef35b9c295 gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.ppc.rpm     MD5: c681987521915f2f2584b949cd247f3aSHA-256: 64e82e91f7c18920a5d0735a34401b2f548dbc4a4910db98c373e25697d09271 gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.ppc64.rpm     MD5: fe5d369309b38bae84d4ea7f507ad526SHA-256: 75bbf1c8f62d6ae79afb782c736798623f4a6d42ad8117eb5b31e8ac89b5f7a4   PPC64LE: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.ppc64le.rpm     MD5: 6352ccfb9398b50dad20176a5da2d063SHA-256: 30fb1fe89c0ed3861eb68c057d8402587338536f6adecc71920f64df80051075 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.ppc64le.rpm     MD5: b72d70b20621a5be1323caf63d05ca9aSHA-256: 6e8e282fe07740d63022ca12ee5ef65e3d2fa591f2b2d5e817b550c5869c0e3a gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.ppc64le.rpm     MD5: 539a90acc3ffc72c6e17a691aa42d39bSHA-256: 3866bc99ad3fb565daea711bd5fe4380a97265d3a6c08c4d0077fef14667793c   s390x: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.s390.rpm     MD5: 0472dfaa3d89d97ba30713c274e5f049SHA-256: 2f33d4f0cc81b96d1d68d0bc9680581f34475a8ebe298937645aaeb442c4efbd gstreamer1-plugins-bad-free-1.4.5-6.el7_3.s390x.rpm     MD5: ab4ce6ff92f2017a13e94457157d75e1SHA-256: b6b61d685981eb05ab60b6f03b4065c6154828ae77b94f5e23c69e140ed5b00e gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.s390.rpm     MD5: 90cf3926958e176e8c58c38aae669754SHA-256: 11284709ba3696e876f109e2e4ac8dd7296ce159c456a10307be790afefe3ffe gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.s390x.rpm     MD5: fec16d5329097f9977432be2b5f41ecdSHA-256: 32c61ccf5a908135fa5590b9026e0ce3f986b88838c474a5e720c317971c4e4b gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.s390.rpm     MD5: 61a3f98a9b329ff1472869d625d3a251SHA-256: 5f7b1402819517961604d8e134f2d85e5bef5e31daa54687650d740559693032 gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.s390x.rpm     MD5: 790374d0579c594431125f4605bd6550SHA-256: 9e87e4a781c7d16e64a8ec922559b3cb48f905fd392259611fac5ce7a591eb6d   x86_64: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.i686.rpm     MD5: e782a667ebd7f35fb60869baec47f7c1SHA-256: e7b92af47a3b2dd40768fbabcc03b3c4b204e03149374353e14a6a78893801ad gstreamer1-plugins-bad-free-1.4.5-6.el7_3.x86_64.rpm     MD5: 02d0dcd8176440cf10640bc78481b1a2SHA-256: eaf7c7c7496bd8b3c81fc6be1e13532b3bc8a84dde99b5b791bdfc4e4290feb0 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.i686.rpm     MD5: 6f6f3e66fb3d78dcd87d9806ef51a2d2SHA-256: 1b367db491279cbfe51c38510345a81fe43b87972b7718181708d0c1b3ac8d12 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.x86_64.rpm     MD5: a7aafcdabe0b3a795f804a3fa6235ce3SHA-256: badb1e0b6d218fe587cfc1b56f2b157b2408b5f4ffe4e8d683df6ecc1350e2da gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.i686.rpm     MD5: a438a6b2b63503ebab7d838d992567aaSHA-256: 661cc4a4d9bb10ea2ab239301f33fc00e4b0219ce6a15780a053c64ac469c191 gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.x86_64.rpm     MD5: 1ca7168a7b88718a89e3b8be770c15e4SHA-256: fd0ea8e920f7c3c83e1fa533b9ca73a75842e635e2232392d362c1f91d675a9c   Red Hat Enterprise Linux Server TUS (v. 7.3) SRPMS: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.src.rpm     MD5: f1b972e24d2f83fd00c12822762699bbSHA-256: 669aba86bc3d4c4c83de25943b744dcb41f0177dc39df3c86c42fa6ef684dbbd   x86_64: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.i686.rpm     MD5: e782a667ebd7f35fb60869baec47f7c1SHA-256: e7b92af47a3b2dd40768fbabcc03b3c4b204e03149374353e14a6a78893801ad gstreamer1-plugins-bad-free-1.4.5-6.el7_3.x86_64.rpm     MD5: 02d0dcd8176440cf10640bc78481b1a2SHA-256: eaf7c7c7496bd8b3c81fc6be1e13532b3bc8a84dde99b5b791bdfc4e4290feb0 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.i686.rpm     MD5: 6f6f3e66fb3d78dcd87d9806ef51a2d2SHA-256: 1b367db491279cbfe51c38510345a81fe43b87972b7718181708d0c1b3ac8d12 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.x86_64.rpm     MD5: a7aafcdabe0b3a795f804a3fa6235ce3SHA-256: badb1e0b6d218fe587cfc1b56f2b157b2408b5f4ffe4e8d683df6ecc1350e2da gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.i686.rpm     MD5: a438a6b2b63503ebab7d838d992567aaSHA-256: 661cc4a4d9bb10ea2ab239301f33fc00e4b0219ce6a15780a053c64ac469c191 gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.x86_64.rpm     MD5: 1ca7168a7b88718a89e3b8be770c15e4SHA-256: fd0ea8e920f7c3c83e1fa533b9ca73a75842e635e2232392d362c1f91d675a9c   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.src.rpm     MD5: f1b972e24d2f83fd00c12822762699bbSHA-256: 669aba86bc3d4c4c83de25943b744dcb41f0177dc39df3c86c42fa6ef684dbbd   x86_64: gstreamer1-plugins-bad-free-1.4.5-6.el7_3.i686.rpm     MD5: e782a667ebd7f35fb60869baec47f7c1SHA-256: e7b92af47a3b2dd40768fbabcc03b3c4b204e03149374353e14a6a78893801ad gstreamer1-plugins-bad-free-1.4.5-6.el7_3.x86_64.rpm     MD5: 02d0dcd8176440cf10640bc78481b1a2SHA-256: eaf7c7c7496bd8b3c81fc6be1e13532b3bc8a84dde99b5b791bdfc4e4290feb0 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.i686.rpm     MD5: 6f6f3e66fb3d78dcd87d9806ef51a2d2SHA-256: 1b367db491279cbfe51c38510345a81fe43b87972b7718181708d0c1b3ac8d12 gstreamer1-plugins-bad-free-debuginfo-1.4.5-6.el7_3.x86_64.rpm     MD5: a7aafcdabe0b3a795f804a3fa6235ce3SHA-256: badb1e0b6d218fe587cfc1b56f2b157b2408b5f4ffe4e8d683df6ecc1350e2da gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.i686.rpm     MD5: a438a6b2b63503ebab7d838d992567aaSHA-256: 661cc4a4d9bb10ea2ab239301f33fc00e4b0219ce6a15780a053c64ac469c191 gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.x86_64.rpm     MD5: 1ca7168a7b88718a89e3b8be770c15e4SHA-256: fd0ea8e920f7c3c83e1fa533b9ca73a75842e635e2232392d362c1f91d675a9c   (The unlinked packages above are only available from the Red Hat Network) 1395767 - CVE-2016-9445 gstreamer-plugins-bad-free: Integer overflow when allocating render buffer in VMnc decoder1401880 - CVE-2016-9809 gstreamer-plugins-bad-free: Off-by-one read in gst_h264_parse_set_caps1401930 - CVE-2016-9812 gstreamer1-plugins-bad-free: Out-of-bounds read in gst_mpegts_section_new1401934 - CVE-2016-9813 gstreamer-plugins-bad-free: NULL pointer dereference in mpegts parser These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2017:0020-1: Moderate: gstreamer1-plugins-good security update

An update for gstreamer1-plugins-good is now available for Red Hat EnterpriseLinux 7.Red Hat Product Security has rated this update as having a security impact ofModerate.

A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. GStreamer is a streaming media framework based on graphs of filters whichoperate on media data.

The gstreamer1-plugins-good packages contain a collectionof well-supported plug-ins of good quality and under the LGPL license.Security Fix(es):* Multiple flaws were discovered in GStreamer's FLC/FLI/FLX media file formatdecoding plug-in.

A remote attacker could use these flaws to cause anapplication using GStreamer to crash or, potentially, execute arbitrary codewith the privileges of the user running the application. (CVE-2016-9634,CVE-2016-9635, CVE-2016-9636, CVE-2016-9808)* An invalid memory read access flaw was found in GStreamer's FLC/FLI/FLX mediafile format decoding plug-in.

A remote attacker could use this flaw to cause anapplication using GStreamer to crash. (CVE-2016-9807)Note: This update removes the vulnerable FLC/FLI/FLX plug-in. Red Hat Enterprise Linux Desktop (v. 7) SRPMS: gstreamer1-plugins-good-1.4.5-3.el7_3.src.rpm     MD5: b2cdc74b820731a24c4e1bd522588a1aSHA-256: 21e4e2200496ed706dee127b3df390ee5c29249968ac9fd266ca75d40008f65a   x86_64: gstreamer1-plugins-good-1.4.5-3.el7_3.i686.rpm     MD5: 9a82dd2e50c0495eff1a190e28f0bfc5SHA-256: 40d1b910a6c7d5aca779612f94c3385ec75df94f4d3591330b8142bc8424cc14 gstreamer1-plugins-good-1.4.5-3.el7_3.x86_64.rpm     MD5: 2e6f21e6c0c6af77c057e95ae1e9acd0SHA-256: d86b6bb9bff52a16dd9cd8749d1ffd0d4d80f80ea7d5a081b2e8fd3c958db02f gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.i686.rpm     MD5: c1c60df85d405e447cc0075a894ee50fSHA-256: 878e8a1203bdfa48e7b95870c01ffbe0651218b1418ff64fa20e2aa0a9bb3b85 gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.x86_64.rpm     MD5: ffb235e8896717085ccf2156d3e8218fSHA-256: d949ee125ef4bff0b1c720115eb820f7f90bbb04c1bbbd4d42b228e3ed618e56   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: gstreamer1-plugins-good-1.4.5-3.el7_3.src.rpm     MD5: b2cdc74b820731a24c4e1bd522588a1aSHA-256: 21e4e2200496ed706dee127b3df390ee5c29249968ac9fd266ca75d40008f65a   x86_64: gstreamer1-plugins-good-1.4.5-3.el7_3.i686.rpm     MD5: 9a82dd2e50c0495eff1a190e28f0bfc5SHA-256: 40d1b910a6c7d5aca779612f94c3385ec75df94f4d3591330b8142bc8424cc14 gstreamer1-plugins-good-1.4.5-3.el7_3.x86_64.rpm     MD5: 2e6f21e6c0c6af77c057e95ae1e9acd0SHA-256: d86b6bb9bff52a16dd9cd8749d1ffd0d4d80f80ea7d5a081b2e8fd3c958db02f gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.i686.rpm     MD5: c1c60df85d405e447cc0075a894ee50fSHA-256: 878e8a1203bdfa48e7b95870c01ffbe0651218b1418ff64fa20e2aa0a9bb3b85 gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.x86_64.rpm     MD5: ffb235e8896717085ccf2156d3e8218fSHA-256: d949ee125ef4bff0b1c720115eb820f7f90bbb04c1bbbd4d42b228e3ed618e56   Red Hat Enterprise Linux Server (v. 7) SRPMS: gstreamer1-plugins-good-1.4.5-3.el7_3.src.rpm     MD5: b2cdc74b820731a24c4e1bd522588a1aSHA-256: 21e4e2200496ed706dee127b3df390ee5c29249968ac9fd266ca75d40008f65a   PPC: gstreamer1-plugins-good-1.4.5-3.el7_3.ppc.rpm     MD5: 35f3105f4f719f1447c28ebf6d2ffcbdSHA-256: 8e7acc7c3a5dcdbc79e0d2f86fd7140377d517da94320f99153d88e1d6b40dd7 gstreamer1-plugins-good-1.4.5-3.el7_3.ppc64.rpm     MD5: f2a4931f114357b127b88a45aacf3beaSHA-256: c20bef2319c6c2835274adee4ed5ab6d2fa38f36029011ad86a93827c300c1b9 gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.ppc.rpm     MD5: 08b115f0169c7c8be48c7fd3d2373b3cSHA-256: ce430fc75378aa336b7d13eee25b823a3109daf3fb295c82874d369305d683e0 gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.ppc64.rpm     MD5: d0baa344bc1c061306019b3f404b155dSHA-256: cb3dc4ea7306a0bad7f98b8b78e33faa6fd23c58c6ab8868b1655ebf3439e078   PPC64LE: gstreamer1-plugins-good-1.4.5-3.el7_3.ppc64le.rpm     MD5: 163c6818578045dceaa48c44dfc8e4b3SHA-256: c6a9782e9e2cd52fbe6d81c18c2cdd3a8ecf3aeb0ca9cd5a4a058be3858ba439 gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.ppc64le.rpm     MD5: 355efc1224ce683c859d464a85aeda47SHA-256: 03866ba9b56433843eb794e0d0994189d3a97a759f34c49a13d580512adccf7d   s390x: gstreamer1-plugins-good-1.4.5-3.el7_3.s390.rpm     MD5: 808757124482e353f00c5d8b15dab0e1SHA-256: cfdab42673e31ae894a2d91c224e3054b0b524152ab4288239d17747dea04e5e gstreamer1-plugins-good-1.4.5-3.el7_3.s390x.rpm     MD5: d0659c5b03252d32ec9e8b601f2bd6ccSHA-256: 6a7e1f93e67ad567ee96a2a69d47274c2400667bb74bc6ed8bcca26e94aea13b gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.s390.rpm     MD5: c6fea6687b9532233e4f485bf16acbfdSHA-256: 6a5715c1a765def40dd3175542c000fb0a52edc7fa32a30537b9c3604884f65c gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.s390x.rpm     MD5: 05d75386eb6613c14c057aecf02c1f10SHA-256: 109f7c9a69f575e6862ccb9ef3929d528ffd019fbd6a86e7418ecd3457e5502c   x86_64: gstreamer1-plugins-good-1.4.5-3.el7_3.i686.rpm     MD5: 9a82dd2e50c0495eff1a190e28f0bfc5SHA-256: 40d1b910a6c7d5aca779612f94c3385ec75df94f4d3591330b8142bc8424cc14 gstreamer1-plugins-good-1.4.5-3.el7_3.x86_64.rpm     MD5: 2e6f21e6c0c6af77c057e95ae1e9acd0SHA-256: d86b6bb9bff52a16dd9cd8749d1ffd0d4d80f80ea7d5a081b2e8fd3c958db02f gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.i686.rpm     MD5: c1c60df85d405e447cc0075a894ee50fSHA-256: 878e8a1203bdfa48e7b95870c01ffbe0651218b1418ff64fa20e2aa0a9bb3b85 gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.x86_64.rpm     MD5: ffb235e8896717085ccf2156d3e8218fSHA-256: d949ee125ef4bff0b1c720115eb820f7f90bbb04c1bbbd4d42b228e3ed618e56   Red Hat Enterprise Linux Server TUS (v. 7.3) SRPMS: gstreamer1-plugins-good-1.4.5-3.el7_3.src.rpm     MD5: b2cdc74b820731a24c4e1bd522588a1aSHA-256: 21e4e2200496ed706dee127b3df390ee5c29249968ac9fd266ca75d40008f65a   x86_64: gstreamer1-plugins-good-1.4.5-3.el7_3.i686.rpm     MD5: 9a82dd2e50c0495eff1a190e28f0bfc5SHA-256: 40d1b910a6c7d5aca779612f94c3385ec75df94f4d3591330b8142bc8424cc14 gstreamer1-plugins-good-1.4.5-3.el7_3.x86_64.rpm     MD5: 2e6f21e6c0c6af77c057e95ae1e9acd0SHA-256: d86b6bb9bff52a16dd9cd8749d1ffd0d4d80f80ea7d5a081b2e8fd3c958db02f gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.i686.rpm     MD5: c1c60df85d405e447cc0075a894ee50fSHA-256: 878e8a1203bdfa48e7b95870c01ffbe0651218b1418ff64fa20e2aa0a9bb3b85 gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.x86_64.rpm     MD5: ffb235e8896717085ccf2156d3e8218fSHA-256: d949ee125ef4bff0b1c720115eb820f7f90bbb04c1bbbd4d42b228e3ed618e56   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: gstreamer1-plugins-good-1.4.5-3.el7_3.src.rpm     MD5: b2cdc74b820731a24c4e1bd522588a1aSHA-256: 21e4e2200496ed706dee127b3df390ee5c29249968ac9fd266ca75d40008f65a   x86_64: gstreamer1-plugins-good-1.4.5-3.el7_3.i686.rpm     MD5: 9a82dd2e50c0495eff1a190e28f0bfc5SHA-256: 40d1b910a6c7d5aca779612f94c3385ec75df94f4d3591330b8142bc8424cc14 gstreamer1-plugins-good-1.4.5-3.el7_3.x86_64.rpm     MD5: 2e6f21e6c0c6af77c057e95ae1e9acd0SHA-256: d86b6bb9bff52a16dd9cd8749d1ffd0d4d80f80ea7d5a081b2e8fd3c958db02f gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.i686.rpm     MD5: c1c60df85d405e447cc0075a894ee50fSHA-256: 878e8a1203bdfa48e7b95870c01ffbe0651218b1418ff64fa20e2aa0a9bb3b85 gstreamer1-plugins-good-debuginfo-1.4.5-3.el7_3.x86_64.rpm     MD5: ffb235e8896717085ccf2156d3e8218fSHA-256: d949ee125ef4bff0b1c720115eb820f7f90bbb04c1bbbd4d42b228e3ed618e56   (The unlinked packages above are only available from the Red Hat Network) 1397441 - CVE-2016-9634 CVE-2016-9635 CVE-2016-9636 CVE-2016-9808 gstreamer-plugins-good: Heap buffer overflow in FLIC decoder1401874 - CVE-2016-9807 gstreamer-plugins-good: Invalid memory read in flx_decode_chunks These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: