VMworld Europe 2014 Day 1: Interesting VDI news

VMworld Europe 2014 Day 1: Interesting VDI news

VMworld Europe 2014 opened today in Barcelona. In this first day of one of the most outstanding virtualization and cloud computing events, VMware announced new products, program and service that add to the growing list of innovative solutions for end-user computing. Among them is VMware Horizon FLEX that will enable enterprises to centrally provision, manage and secure virtual desktops and applications running locally on Macs and PCs, using policy-based controls to more securely embrace bring your own (BYO) policies.

In addition, a new cloud service for desktop disaster recovery will allow organizations to protect their business and enhance workforce continuity, expansion of cloud hosted services in Europe will open opportunities for customers, and a new storage program will help customers quickly predict and control virtual desktop deployment costs at scale.

Security bug found in Xen hypervisor

Security bug found in Xen hypervisor

A vulnerability in Xen hypervisor has broken the security around multi-tenant environments. It allows Xen hardware virtual machines (HVM) to access data storaged in other HVM-based machines that are located in the same hardware. This bug, which has been registered as CVE-2014-7188, also allows to crash the host.

ARM systems and paravirtualization servers (PV) of the Open Source hypervisor haven’t been affected. The only vulnerable systems are x86.

Xen Project has published a patch to solve this problem, which affected big companies, such as Amazon or Rackspace, that had to reboot their virtualized servers.

Source: www.eweek.com

Major vulnerability found in bash

Major vulnerability found in bash

A major vulnerability has been discovered that targets bash, the Unix system (including OSX) and Linux commands interpreter. Apparently, this security flaw is also affecting other interpreters, such as ksh, tcsh, zsh and csh. Nevertheless, other shells aren’t being affected.

UDS Enterprise servers aren’t vulnerable to this fail, so the security of the virrual machines which provide UDS Enterprise remains unaltered.

This vulnerability has been registed as CVE-2014-6271 and it allows to execute certain commands due to the wrong process of the environment variables. Besides, it may be exploited remotely.

Skip to content