CEBA-2016:0022 CentOS 6 libcanberra FASTTRACKBugFix Update

CentOS Errata and Bugfix Advisory 2016:0022 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0022.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
1d46b8216b0321300d9e849ef6638cce1502e291a76cc8946a15c6f29ec49d6d  libcanberra-0.22-3.el6.i686.rpm
e141de513daf28e63f332218a6bad7ca87e79835dda17cc06d19c923d5e0d7b0  libcanberra-devel-0.22-3.el6.i686.rpm
744deaeb955bb2fd3c7dcb448520e59b572b8c9523e5c24666809d418e697699  libcanberra-gtk2-0.22-3.el6.i686.rpm

x86_64:
1d46b8216b0321300d9e849ef6638cce1502e291a76cc8946a15c6f29ec49d6d  libcanberra-0.22-3.el6.i686.rpm
2f4030352f08891a3f43b26b0c4aa78817f1cdd5cdbb1e5afcf1d5bbe7701783  libcanberra-0.22-3.el6.x86_64.rpm
e141de513daf28e63f332218a6bad7ca87e79835dda17cc06d19c923d5e0d7b0  libcanberra-devel-0.22-3.el6.i686.rpm
8651ac9eb23fd345ccb1847cec52bd1767bc8f4819dc986778b133c71c649b49  libcanberra-devel-0.22-3.el6.x86_64.rpm
744deaeb955bb2fd3c7dcb448520e59b572b8c9523e5c24666809d418e697699  libcanberra-gtk2-0.22-3.el6.i686.rpm
85665af03e46af9550800d312e81446de9559bd287ee3ea57dc731d45cfdea1c  libcanberra-gtk2-0.22-3.el6.x86_64.rpm

Source:
6a8d5306caa39c8e272551ecbbedfaf26046890f0b93ad9ee08e7029e55ad8ef  libcanberra-0.22-3.el6.src.rpm



CEBA-2016:0020 CentOS 6 logwatch FASTTRACK BugFixUpdate

CentOS Errata and Bugfix Advisory 2016:0020 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0020.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
cb9758c76a0ad8ee1ab12b5a6ffc27c72be8f88dc01359e3cb97c1754a2467d0  logwatch-7.3.6-54.el6.noarch.rpm

x86_64:
cb9758c76a0ad8ee1ab12b5a6ffc27c72be8f88dc01359e3cb97c1754a2467d0  logwatch-7.3.6-54.el6.noarch.rpm

Source:
f22084a0f4f5114cb4d38722d95ee8df3a36adf1fd0f7bae5bea88566ffc43b2  logwatch-7.3.6-54.el6.src.rpm



CEBA-2016:0021 CentOS 6 freeipmi FASTTRACK BugFixUpdate

CentOS Errata and Bugfix Advisory 2016:0021 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0021.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
bf1215c882abdfa6ebac45dbb0d701996afad41c7a35016c2d2bfc80ac8892ca  freeipmi-1.2.1-7.el6.i686.rpm
eb3dd2b37a3e4d29cb8e5645c4f235d3295a1e1ef74475189c1e9991889d594e  freeipmi-bmc-watchdog-1.2.1-7.el6.i686.rpm
808666d9c36024a3c74754de809f27506f71d458073d51470ae1944b2d2d5740  freeipmi-devel-1.2.1-7.el6.i686.rpm
6297ec7d60e56d61613aa1752f557bbbcbf31b8f50a98f2859ea4a48bd10a837  freeipmi-ipmidetectd-1.2.1-7.el6.i686.rpm

x86_64:
bf1215c882abdfa6ebac45dbb0d701996afad41c7a35016c2d2bfc80ac8892ca  freeipmi-1.2.1-7.el6.i686.rpm
12f33eb38f25269d76b841bf5621cd481d2f42a19ef26602dea632ccd57dab41  freeipmi-1.2.1-7.el6.x86_64.rpm
baf1dfd1df735026492784bd572f7bfe7fe207e745ba9c865ed535e4b4bf47af  freeipmi-bmc-watchdog-1.2.1-7.el6.x86_64.rpm
808666d9c36024a3c74754de809f27506f71d458073d51470ae1944b2d2d5740  freeipmi-devel-1.2.1-7.el6.i686.rpm
9e8e2f1fce93ea91b8c28503006f73b13bcf39a666df311da6dbff382b055ce7  freeipmi-devel-1.2.1-7.el6.x86_64.rpm
a73a6523500070a91da712beb15cbcd5adfad5a3562ea8bb5012209b09f27d7b  freeipmi-ipmidetectd-1.2.1-7.el6.x86_64.rpm

Source:
a11ff9f0fe520f17096ce63f774596d12f39346bfbb1eb7ac0aebbdce2a10193  freeipmi-1.2.1-7.el6.src.rpm



Bypassing McAfee's Application Whitelisting For Critical Infrastructure Systems

This paper describes the results of the research conducted by SEC Consult Vulnerability Lab on the security of McAfee Application Control. This product is an example of an application whitelisting solution which can be used to further harden critical systems such as server systems in SCADA environments or client systems with high security requirements like administrative workstations. Application whitelisting is a concept which works by whitelisting all installed software on a system and after that prevent the execution of not whitelisted software. This should prevent the execution of malware and therefore protect against advanced persistent threat (APT) attacks. McAfee Application Control is an example of such a software. It can be installed on any system, however, the main field of application is the protection of highly critical infrastructures. While the core feature of the product is application whitelisting, it also supports additional security features including write and read protection as well as different memory corruption protections.