[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Publicity] More XSA 108 Coverage
FYI, some more XSA-108 from late Friday and over the weekend.
The Xen bug is both a good example of collective security and a warning of what can happen as IT shifts toward a greater reliance on cloud computing. The bug was discovered and interested parties notified before the full nature of the exploit was disclosed. Collective security action followed, apparently (at this early date) in time before any malicious code writers could act on the disclosure. At the same time, the bug illustrates the cloud's dependence on one hypervisor or another and how a major hypervisor bug will affect more than one supplier. The growing, more uniform nature of x86 cloud environments represent a fatter target for highly skilled intruders to aim for, and a richer environment for manipulation if they succeed at getting inside. ResponsibleÂvulnerabilityÂdisclosure is an ongoing matter of debate in the technology community.ÂGoogle announced a wave of reforms to its Chrome Bug Bounty Programme's submission policyÂon 1 October designed to make it easier for hunters http://www.usnews.com/news/articles/2014/10/02/will-cloud-security-kill-the-password Article mostly about iCloud server security breach, weak passwords. Xen Project listed as another cloud security example. The latest security gap in a cloud-computing system wasÂannouncedÂThursday by the Xen Project software group, which has released a patch to repair a flaw in its platform that could affect cloud services offered by Amazon and Rackspace. On Fri, Oct 3, 2014 at 4:14 PM, Sarah Conway <sconway@xxxxxxxxxxxxxxxxxxx> wrote:
Sarah Conway PR Manager The Linux Foundation sconway@xxxxxxxxxxxxxxxxxxx (978) 578-5300 ÂCell Skype: Âsarah.k.conway _______________________________________________ Publicity mailing list Publicity@xxxxxxxxxxxxxxxxxxxx http://lists.xenproject.org/cgi-bin/mailman/listinfo/publicity
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |