A Xen Security Bulletin, warning of a vunerability that is not yet public, has again forced the major public clouds that rely on the Xen hypervisor, including all 3 Qbox infrastructure partners, to issue rolling reboots of a portion of their VM’s.

This must be done prior to March 10 when the details of the vulnerability will be released, ringing the dinner bell for all manner of bad actors to feast upon unpatched instances.

This is the 3rd such “cloud reboot” since October of 2014, so they are getting better at dealing with a crisis — as is Qbox.

Keep reading