Gartner analyst George Weiss said that XenSource chief Peter Levine has to make a concerted effort in order to retain the loyalty of the open source Xen developers. Otherwise, he said, the open source community may look at the future of the Xen project destiny with too much uncertainty to continue supporting it.
“The possible downside here is the open source community might see that technology being co-opted by a larger conglomerate of proprietary company that may use the open source as a vehicle toward the financial gains and monetary rewards of this Citrix-XenSource company,” Weiss said.
Weiss said that the move could even cause companies such as Red Hat and Novell toward alternative technologies, such as Santa Clara, Calif.-based Qumranet’s Kernel-based Virtual Machine (KVM), a Linux kernel infrastructure for supporting virtualization.
vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus
Comments
Post a Comment