Linux security expert Phil Oester discovered a privilege-escalation critical vulnerability affecting the Linux Kernel. This bug is called Dirty COW and identified as CVE-2016-5195 and although it has recently been discovered, it existed since 2007.
This flaw affects the component Kernel Memory Subsystem, allows to manipulate an unknown input and explote the vulnerability that may affect the system’s confidenciality, integrity and availability.
The different uses of UDS Enterprise connection broker, an interesting Open Source software for containers management in Unix OS and UDS Enterprise authentication system have been the most read topics in our blog for the last weeks.
Below you can find the links to the articles about these topics so you can keep up to date with the most outstanding news on Open Source and virtualization according to our community:
Security is one of the top concerns for many users, companies and organizations, that look for the best solutions to keep sensitive data safe.
KeePassX is one of them, an Open Source application both for Windows and Linux with a light interface which saves user names, passwords, urls, attachments and comments in a properly encrypted single database.
UDS Enterprise, the multiplatform connection broker to deploy and manage virtual and physical desktops, applications and other Windows and Linux services, features a unique authentication system that not only supports different authentication methods, but also allows to use them simultaneously and enable splitted authentication.
The broker incorporates an internal database authenticator which enables connections to any registered service in the system using a single generic connection user.
As usual, today we collect the most read articles in our blog during the last weeks. We talk about application virtualization, remote desktop services and security regarding thin clients used for desktop virtualization.
Find below the links to these posts so that you keep up to date with the latests news on virtualization and Open Source:
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.