Linux security expert Phil Oester discovered a privilege-escalation critical vulnerability affecting the Linux Kernel. This bug is called Dirty COW and identified as CVE-2016-5195 and although it has recently been discovered, it existed since 2007.
This flaw affects the component Kernel Memory Subsystem, allows to manipulate an unknown input and explote the vulnerability that may affect the system’s confidenciality, integrity and availability.
The wellknown consulting firm IDC recommends in a recently published report the use of our software for VDI. According to the analysts, “UDS Enterprise provides the answer to the management needs of the lifecycle of virtual desktops and the access of remote and local users to desktop virtualization platforms and other remote desktop resources, such as applications“.
VMware announced during the event VMworld Europe which is being held this week in Barcelona anew version of vSphere, that will be compatible with containers technologies.
The new release of the hypervisor makes the work of IT admins more easy, sice it offers more automation capabilities and has more advanced management functionalities, while reinforces integrated security and supports new applications.
Some of UDS Enterprise 2.0 new features have raised the interest of the readers of our blog during last two weeks. In fact, two of the three most read posts deal with new functionalities of the new version of our software: scheduling and automating tasks and grouping services. The last of our most outstanding articles in the first fortnight of October is a tutorial on creating virtual machines in oVirt 4.0.
Just in case you didn’t have the chance to read them, find below the links to these posts so you can keep up to date with the most interesting news about virtualization and Open Source according to our followers:
Download UDS ENTERPRISE and provide 24x7 secure access to your workspaces from anywhere and any device
Manage cookie consent
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.