You can enjoy the latest, selected fresh recent open source technology, preparedness and open source news media podcasts, in the section below. Hope, you’ll have an informative time listening 2 all the recent high quality news content 4 free, without restricted access and challenge to your freedom looming. Don’t forget to kindly support the providers via their pages, if you like their content. You can also contribute and help to keep this project running. Click here to refresh the page.
Open Source Technology Podcasts
@ubuntusecurity<\/a>, <a href=\"https:\/\/twitter.com\/ubuntu_sec\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">@ubuntu_sec on twitter<\/a><\/li>\n<\/ul>\n","author":"Ubuntu Security Team","date":"June 2, 2023","link":"https:\/\/ubuntusecuritypodcast.org\/episode-197\/","src":"https:\/\/people.canonical.com\/~amurray\/USP\/USP_E197.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"e38d7dfea6bcedcfeff5f04d45b7e533","fset":"","fratio":1},"ppe-3311-2":{"title":"98: The One with 45Drives","description":"<p>We chat with 45Drives about their ambitions to build a home-lab server that bridges the gap between enterprise-level servers and consumer-grade NAS products. And more.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"http:\/\/tailscale.com\/selfhosted\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale<\/a>: <a href=\"http:\/\/tailscale.com\/selfhosted\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere. Get 20 devices for free for a personal account. <\/a><\/li>\n<li><a href=\"https:\/\/linode.com\/ssh\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode<\/a>: <a href=\"https:\/\/linode.com\/ssh\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Receive a $100 60-day credit towards your new account. <\/a> Promo Code: linode.com\/ssh<\/li>\n<\/ul>\n<p><a href=\"https:\/\/jupitersignal.memberful.com\/checkout?plan=53744\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support Self-Hosted<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.theverge.com\/2023\/5\/30\/23742109\/amazon-alexa-celebrity-voices-discontinued\" title=\"Amazon is discontinuing Alexa’s celebrity voices, even if you paid for them\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Amazon is discontinuing Alexa’s celebrity voices, even if you paid for them<\/a> — “After three years, we’re winding down celebrity voices,” Amazon spokesperson Eric Sveum says in a statement to The Verge. “Customers will be able to continue using these voices for a limited time, and can contact our customer service team for a refund.”<\/li>\n<li><a href=\"https:\/\/www.reddit.com\/r\/DataHoarder\/comments\/130m860\/45drives_needs_your_help_developing_a_homelab\/\" title=\"45Drives Needs Your Help Developing a Homelab Server\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">45Drives Needs Your Help Developing a Homelab Server<\/a> — 45Drives here to talk about a new project that we are super excited about. We’ve realized it’s time to build a home lab-level storage server.<\/li>\n<li><a href=\"https:\/\/old.reddit.com\/r\/selfhosted\/comments\/13rsuu3\/emby_security_advisory_may_25_2023\/\" title=\"Emby Security Advisory - May 25, 2023 \" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Emby Security Advisory – May 25, 2023 <\/a><\/li>\n<li><a href=\"https:\/\/github.com\/Byron\/dua-cli\" title=\"dua-cli\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">dua-cli<\/a> — dua (-> Disk Usage Analyzer) is a tool to conveniently learn about the usage of disk space of a given directory. It’s parallel by default and will max out your SSD, providing relevant information as fast as possible. Optionally delete superfluous data, and do so more quickly than rm.<\/li>\n<li><a href=\"https:\/\/code.visualstudio.com\/docs\/devcontainers\/containers\" title=\"Developing inside a Container using Visual Studio Code Remote Development\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Developing inside a Container using Visual Studio Code Remote Development<\/a> — The Visual Studio Code Dev Containers extension lets you use a container as a full-featured development environment. It allows you to open any folder inside (or mounted into) a container and take advantage of Visual Studio Code’s full feature set.<\/li>\n<li><a href=\"https:\/\/getalby.com\/\" title=\"Alby: Your Boost companion for the web\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Alby: Your Boost companion for the web<\/a> — Alby brings Boosts to the web.<\/li>\n<li><a href=\"https:\/\/podcastindex.org\/podcast\/830124\" title=\"Self-Hosted on the Podcastindex.org\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Self-Hosted on the Podcastindex.org<\/a> — Send a Boost into the show via the web. First, top-up Alby, then head over to our entry on the Podcast Index.<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"June 2, 2023","link":"https:\/\/selfhosted.show\/98","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/7296e34a-2697-479a-adfb-ad32329dd0b0\/a38c87b3-69d0-4f83-b75e-1c862fd903d6.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"29cc3910749d07cc5e8a1a6fc2b4c3af","fset":"","fratio":1},"ppe-3311-3":{"title":"Linux Action News 295","description":"<p>How the recent XFS bug was squashed, insights into why Microsoft built their own Linux from scratch, and recent attacks on Archive.org.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"https:\/\/l.kolide.co\/3klbWzr\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kolide<\/a>: <a href=\"https:\/\/l.kolide.co\/3klbWzr\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kolide can help you nail third-party audits and internal compliance goals with endpoint security for your entire fleet. <\/a><\/li>\n<li><a href=\"http:\/\/linode.com\/lan\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode<\/a>: <a href=\"http:\/\/linode.com\/lan\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Sign up using the link on this page and receive a $100 60-day credit towards your new account. <\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.jupiter.party\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support Linux Action News<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.phoronix.com\/news\/Linux-6.3-XFS-Metadata-Corrupt\" title=\"Those Using The XFS File-System Will Want To Avoid Linux 6.3 For Now\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Those Using The XFS File-System Will Want To Avoid Linux 6.3 For Now<\/a><\/li>\n<li><a href=\"https:\/\/www.phoronix.com\/news\/XFS-Patch-For-Linux-6.3\" title=\"XFS Metadata Corruption On Linux 6.3 Tracked Down To One Missing One-Line Patch\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">XFS Metadata Corruption On Linux 6.3 Tracked Down To One Missing One-Line Patch<\/a> — This is a bug fix that we thought just fixed a livelock on stripe aligned filesystems. I’m guessing that in certain circumstances instead of livelocking on repeated failed allocations, it results in a broken mapping being returned to the writeback code and hence misdirecting the writeback IO.<\/li>\n<li><a href=\"https:\/\/www.phoronix.com\/news\/Linux-6.3.5-Released\" title=\"Linux 6.3.5 Released With XFS Metadata Corruption Fix\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linux 6.3.5 Released With XFS Metadata Corruption Fix<\/a> — Making Linux 6.3.5 a notable point release is that it has back-ported the fix for the XFS metadata corruption bug that was plaguing the Linux 6.3 point releases.<\/li>\n<li><a href=\"https:\/\/devclass.com\/2023\/05\/25\/azure-linux-released-at-build-where-microsoft-revealed-why-it-did-not-fork-fedora\/\" title=\"Azure Linux - Microsoft revealed why it did not fork Fedora\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Azure Linux – Microsoft revealed why it did not fork Fedora<\/a> — Why did Microsoft create Azure Linux? “We needed a Linux distribution internally,” Perrin said. “We wanted a consistent platform for ourselves.” Now there is “one vendor to support the full AKS stack”.<\/li>\n<li><a href=\"https:\/\/pagure.io\/fedora-kde\/SIG\/issue\/347\" title=\"Plasma 6 is Wayland only - No X11 for Plasma 6\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Plasma 6 is Wayland only – No X11 for Plasma 6<\/a> — With Fedora KDE and Kinoite being fully Wayland by default from login (since F38) to desktop (since F34), it’s now time to work toward eliminating our dependency on the Xorg server for Plasma 6.0.<\/li>\n<li><a href=\"https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/9\/html\/9.0_release_notes\/deprecated_functionality#JIRA-RHELPLAN-121048\" title=\"Xorg server is deprecated since RHEL 9.0\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Xorg server is deprecated since RHEL 9.0<\/a> — The X.org display server is deprecated, and will be removed in a future major RHEL release. The default desktop session is now the Wayland session in most cases.<\/li>\n<li><a href=\"https:\/\/fedoraproject.org\/wiki\/Changes\/ReplaceFbdevDrivers\" title=\"Fedora 36 Changes: Replace the fbdev drivers with simpledrm and the DRM fbdev emulation layer\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Fedora 36 Changes: Replace the fbdev drivers with simpledrm and the DRM fbdev emulation layer<\/a> — This change replaces the legacy Linux frame buffer device (fbdev) drivers that are still used in Fedora, with the latest simpledrm driver and the DRM fbdev emulation layer.\n<\/li>\n<li><a href=\"https:\/\/ubuntu.com\/\/blog\/time-to-prepare-for-ubuntu-18-04-lts-end-of-standard-support-on-31-may-2023-options-for-google-cloud-users\" title=\"Ubuntu 18.04 LTS end of standard support\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Ubuntu 18.04 LTS end of standard support<\/a> — Ubuntu 18.04 LTS, codenamed ‘Bionic Beaver,’ is approaching the end of its standard five-year maintenance period on 31 May 2023.\n<\/li>\n<li><a href=\"https:\/\/blog.archive.org\/2023\/05\/29\/let-us-serve-you-but-dont-bring-us-down\/\" title=\"Let us serve you, but don’t bring us down\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Let us serve you, but don’t bring us down<\/a> — Tens of thousands of requests per second for our public domain OCR files were launched from 64 virtual hosts on amazon’s AWS services. This activity brought archive.org down for all users for about an hour.<\/li>\n<li><a href=\"http:\/\/archive.org\/\" title=\"Internet Archive\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Internet Archive<\/a> — Internet Archive is a non-profit library of millions of free books, movies, software, music, websites, and more.<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"June 1, 2023","link":"https:\/\/linuxactionnews.com\/295","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/dec90738-e640-45e5-b375-4573052f4bf4\/d4137662-24d6-49da-af22-e93c4d504352.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"c622e9c2514ecb633d5dc41c3ddba7c5","fset":"","fratio":1},"ppe-3311-4":{"title":"509: Dot File Naming","description":"<p>Leveraging OpenZFS to Build Your Own Storage Appliance, Install OpenBSD as a VM, Set up your own CalDAV and CardDAV servers on OpenBSD, display basic computer information using DMI table decoder, Gpart CheatSheet, Rob Pike on the Origin of Unix Dot File Names, and more<\/p>\n<p><strong><em>NOTES<\/em><\/strong><br \/>\nThis episode of BSDNow is brought to you by <a href=\"https:\/\/www.tarsnap.com\/bsdnow\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tarsnap<\/a> and the <a href=\"https:\/\/www.patreon.com\/bsdnow\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">BSDNow Patreon<\/a><\/p>\n<h2>Headlines<\/h2>\n<h3><a href=\"https:\/\/klarasystems.com\/articles\/openzfs-leveraging-openzfs-to-build-your-own-storage-appliance\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenZFS – Leveraging OpenZFS to Build Your Own Storage Appliance<\/a><\/h3>\n<hr>\n<h3><a href=\"https:\/\/byte-sized.de\/linux-unix\/openbsd-als-vm-installieren\/#english\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Install OpenBSD as a VM<\/a><\/h3>\n<hr>\n<h2>News Roundup<\/h2>\n<h3><a href=\"https:\/\/dataswamp.org\/%7Esolene\/2023-04-23-calendar-and-contacts-with-radicale.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Set up your own CalDAV and CardDAV servers on OpenBSD<\/a><\/h3>\n<hr>\n<h3><a href=\"https:\/\/sleeplessbeastie.eu\/2023\/03\/31\/how-to-display-basic-computer-information-using-dmi-table-decoder\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">How to display basic computer information using DMI table decoder<\/a><\/h3>\n<hr>\n<h3><a href=\"https:\/\/forums.FreeBSD.org\/threads\/gpart-cheatsheet-wiping-drives-partitioning-formating.45411\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Gpart CheatSheet – wiping drives, partitioning, & formating<\/a><\/h3>\n<hr>\n<h3><a href=\"http:\/\/xahlee.info\/UnixResource_dir\/writ\/unix_origin_of_dot_filename.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Rob Pike on the Origin of Unix Dot File Names<\/a><\/h3>\n<hr>\n<h2>Beastie Bits<\/h2>\n<ul>\n<li>Hackerstations\n<ul>\n<li><a href=\"https:\/\/hackerstations.com\/setups\/mike_mcquaid\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Mike McQuaid’s clean, ergonomic setup in Edinburgh, Scotland<\/a><\/li>\n<li><a href=\"https:\/\/hackerstations.com\/setups\/daniel_stenberg\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Daniel Stenberg and the home of curl in Stockholm, Sweden<\/a><\/li>\n<\/ul>\n<\/li>\n<li>\n<p><a href=\"http:\/\/undeadly.org\/cgi?action=article;sid=20230421124221\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">viogpu(4), a VirtIO GPU driver, added to -current<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"http:\/\/undeadly.org\/cgi?action=article;sid=20230505054214\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenBGPD 8.0 released<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"http:\/\/undeadly.org\/cgi?action=article;sid=20230507122935\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">cron(8) now supports random ranges with steps<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"http:\/\/undeadly.org\/cgi?action=article;sid=20230417074903\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">malloc leak detection available in -current<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.undeadly.org\/cgi?action=article;sid=20230430051250\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">vmd(8) moves to a multi-process model<\/a><\/p>\n<\/li>\n<\/ul>\n<hr>\n<h3>Tarsnap<\/h3>\n<ul>\n<li>\n<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.<\/p>\n<\/li>\n<li>\n<p>Send questions, comments, show ideas\/topics, or stories you want mentioned on the show to <a href=\"mailto:feedback@bsdnow.tv\" rel=\"noopener noreferrer\" target=\"_blank\">feedback@bsdnow.tv<\/a><\/p>\n<hr>\n<\/li>\n<\/ul>\n","author":"Allan Jude","date":"June 1, 2023","link":"https:\/\/www.bsdnow.tv\/509","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/c91b88f1-e824-4815-bcb8-5227818d6010\/6676cfbb-7251-455d-846c-94eb3e6e5c32.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"bad66357d783c0fc06368fa41b4453f4","fset":"","fratio":1},"ppe-3311-5":{"title":"224: KDE Plasma 6, COSMIC Desktop, CodeWeavers, Lutris, Arch Linux & More Linux News","description":"<p>On this episode of This Week in Linux, we got some news about the upcoming desktop environments of KDE Plasma 6 and COSMIC desktop from System76. Then we take a look a the news of CodeWeavers changing their company structure and the changes from Arch Linux. We’ll also check out the latest releases from Lutris, […]<\/p>\n","author":"TuxDigital Network","date":"June 1, 2023","link":"https:\/\/tuxdigital.com\/podcasts\/this-week-in-linux\/twil-224\/","src":"https:\/\/media.blubrry.com\/tuxdigital_thisweekinlinux_mp3\/aphid.fireside.fm\/d\/1437767933\/2389be04-5c79-485e-b1ca-3a5b2cebb006\/7a2e61a1-93fb-48af-9b56-8b46fe007c90.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"77307797fe5b4b62e5d1e94da4303f46","fset":"","fratio":1},"ppe-3311-6":{"title":"The Linux Link Tech Show Episode 1006","description":"<p>pat rocks out.<\/p>\n","author":"dann@thelinuxlink.net (Dann Washko, Linc Fessenden, Pat Davila, Allan Metzler)","date":"June 1, 2023","link":"http:\/\/www.tllts.org","src":"http:\/\/www.tlltsarchive.org\/archives\/tllts_1006-05-31-23.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"25befeaf2a16c61922a22cd4c99b3b42","fset":"","fratio":1},"ppe-3311-7":{"title":"FLOSS Weekly 734: Organic Maps – Roman Tsisyk, Organic Maps","description":"<p>Doc Searls and Katherine Druckman talk with Roman Tsisyk, founder and top maintainer of Organic Maps, an extremely active and exciting open source project for people who like or need to travel off line and in privacy.<\/p>\n<p><strong>Hosts:<\/strong> <a href=\"https:\/\/twit.tv\/people\/doc-searls\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Doc Searls<\/a> and <a href=\"https:\/\/twit.tv\/people\/katherine-druckman\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Katherine Druckman<\/a><\/p>\n<p><strong>Guest:<\/strong> <a href=\"https:\/\/organicmaps.app\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Roman Tsisyk<\/a><\/p>\n<p>Download or subscribe to this show at <a href=\"https:\/\/twit.tv\/shows\/floss-weekly\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/twit.tv\/shows\/floss-weekly<\/a><\/p>\n<p>Think your open source project should be on FLOSS Weekly? Email <a href=\"mailto:floss@twit.tv\" rel=\"noopener noreferrer\" target=\"_blank\">floss@twit.tv<\/a>.<\/p>\n<p>Thanks to <a href=\"https:\/\/www.lullabot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Lullabot’s<\/a> Jeff Robbins, web designer and musician, for our theme music.<\/p>\n<p>Get episodes ad-free with Club TWiT at <a href=\"https:\/\/twit.tv\/clubtwit\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/twit.tv\/clubtwit<\/a><\/p>\n","author":"TWiT","date":"May 31, 2023","link":"https:\/\/twit.tv\/shows\/floss-weekly\/episodes\/734","src":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/audio\/floss\/floss0734\/floss0734.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"8832c62016afc42cba2c26c03b27b04e","fset":"","fratio":1},"ppe-3311-8":{"title":"520: Microsoft Goes All-In","description":"<p>We chew on the best bits from this year’s Microsoft Build and the bright red flag coming from the Rust community.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"https:\/\/linode.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode<\/a>: <a href=\"https:\/\/linode.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Receive a $100 60-day credit towards your new account. <\/a> Promo Code: linode.com\/coder<\/li>\n<li><a href=\"https:\/\/tailscale.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale<\/a>: <a href=\"https:\/\/tailscale.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale is the easiest way to create a peer-to-peer network with the power of Wireguard. <\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/jupitersignal.memberful.com\/checkout?plan=53334\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support Coder Radio<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/thedriven.io\/2023\/05\/29\/ford-adopts-tesla-charging-standard-to-gain-access-to-supercharging-network\/\" title=\"Ford adopts Tesla charging standard\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Ford adopts Tesla charging standard<\/a> — Under the agreement – revealed in a live Twitter Spaces interview with Tesla and Twitter boss Elon Musk, Farley said current Ford owners will be granted access to more than 12,000 Tesla Superchargers, starting early next year via the use of an adapter.<\/li>\n<li><a href=\"https:\/\/www.meremortalspodcast.com\/podcast\/episode\/7eb82808\/chris-fisher-or-the-future-of-advertising-adopting-value-for-value-and-creating-jupiter-broadcasting\" title=\"Chris on Mere Mortals\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Chris on Mere Mortals<\/a> — In Conversation #90, Chris and I discuss: what it’s been like to have 25+ podcasts, the current nosedive in advertising, how value for value is creating a richer experience for podcasters, his mindset in analyzing technological ideas, the coming pain from the messed up financial system, why Bitcoin\/AI won’t be as impactful as the internet and traveling across the US in an RV.<\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=9g-zIA1vpIU\" title=\"CHRIS FISHER | Creating Jupiter Broadcasting - YouTube\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CHRIS FISHER | Creating Jupiter Broadcasting – YouTube<\/a><\/li>\n<li><a href=\"https:\/\/news.microsoft.com\/build-2023\/\" title=\"Microsoft Build 2023 News\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Microsoft Build 2023 News<\/a> — MS’ collection of news from Build 2023.<\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=FaV0tIaWWEg\" title=\"Full Keynote | Satya Nadella Build 2023 - YouTube\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Full Keynote | Satya Nadella Build 2023 – YouTube<\/a> — Satya Nadella Full Keynote at Microsoft Build 2023.<\/li>\n<li><a href=\"https:\/\/www.theregister.com\/2023\/05\/24\/windows_365_boot_preview\/\" title=\"Microsoft enables booting PCs directly into cloud PCs\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Microsoft enables booting PCs directly into cloud PCs<\/a> — Microsoft has delivered a preview of tech that lets a physical PC boot into a virtual one, running in Azure, instead of running Windows from its local drive.<\/li>\n<li><a href=\"https:\/\/blogs.windows.com\/windowsdeveloper\/2023\/05\/23\/bringing-the-power-of-ai-to-windows-11-unlocking-a-new-era-of-productivity-for-customers-and-developers-with-windows-copilot-and-dev-home\/\" title=\"Bringing the power of AI to Windows 11\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bringing the power of AI to Windows 11<\/a><\/li>\n<li><a href=\"https:\/\/www.theverge.com\/2023\/5\/23\/23733294\/microsoft-dev-box-cloud-workstation-build-release-date\" title=\"Microsoft is launching its Dev Box cloud-powered workstations this July\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Microsoft is launching its Dev Box cloud-powered workstations this July<\/a> — Microsoft Dev Box provides developers with apps and services to test their projects.<\/li>\n<li><a href=\"https:\/\/www.jntrnr.com\/why-i-left-rust\/\" title=\"Why I left Rust\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Why I left Rust<\/a> — There’s a lot of speculation about why I left Rust yesterday, so I want to set the record straight in this post.<\/li>\n<li><a href=\"https:\/\/www.daskeyboard.com\/mactigr\/\" title=\"Das Keyboard MacTigr Mechanical Keyboard\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Das Keyboard MacTigr Mechanical Keyboard<\/a><\/li>\n<li><a href=\"https:\/\/getalby.com\/\" title=\"Alby: Your Boost companion for the web\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Alby: Your Boost companion for the web<\/a> — Your Boost companion for the web <\/li>\n<li><a href=\"https:\/\/podcastindex.org\/podcast\/487548\" title=\"Coder Radio on the Podcastindex.org\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Coder Radio on the Podcastindex.org<\/a> — Send a Boost into the show via the web. First, top-up Alby, then head over to our entry on the Podcast Index.<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 31, 2023","link":"https:\/\/coder.show\/520","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/b44de5fa-47c1-4e94-bf9e-c72f8d1c8f5d\/5353aa90-c034-4ed3-8474-bedfc86cb999.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"21e9cb201c37dabc12cd22b57e7ec941","fset":"","fratio":1},"ppe-3311-9":{"title":"413 \u2013 Flying Wigs","description":"<p>First up in the news, Arch migrates Git, Ubuntu changes PPAs, Fedora Onyx is approved, Google to remove old accounts, Debian re-imposes a moratorium, Proton goes Family, Red Hat unveils a new Desktop, Fedora plans to drop X11, Thunderbird gets a new logo;<\/p>\n<p>In security and privacy, Google’s 2FA isn’t private enough;<\/p>\n<p>Then in our Wanderings, I’m off to University, Joe is manacled to his office, Moss kicks the tires on the new Bodhi, and Bill migrates<\/p>\n<hr>\n<h2>The News<\/h2>\n<p><strong>Arch Migrates Git<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.omgubuntu.co.uk\/2023\/05\/significant-changes-to-ppas-coming-in-ubuntu-23-10\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Ubuntu Makes “Significant Changes” to PPAs for 23.10<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/9to5linux.com\/fedora-onyx-approved-as-immutable-fedora-linux-39-spin-with-budgie-desktop\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Fedora Onyx, Immutable and with Budgie, approved for Fedora 39<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/arstechnica.com\/?p=1939628\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Google To Start Removing Inactive Accounts After 2 Years<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.omgubuntu.co.uk\/2023\/05\/try-chrome-design-fresh-2023-linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>Google Chrome’s 2023 UI Refresh on Ubuntu<\/strong><\/a><\/p>\n<p><strong><a href=\"https:\/\/www.phoronix.com\/news\/Debian-Reinstate-usr-Moratorium\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Debian Votes to Reinstate Merged-usr File Movement Moratorium<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/proton.me\/blog\/proton-family-plan\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Proton Unveils Family Plan<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/developers.redhat.com\/articles\/2023\/05\/23\/podman-desktop-now-generally-available#\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Red Hat Reveals Podman Desktop 1.0<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/linuxiac.com\/fedora-plans-to-drop-x11-support-in-plasma-6\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Fedora Intends To Completely Drop X11 in Plasma 6<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/blog.thunderbird.net\/2023\/05\/introducing-the-brand-new-thunderbird-logo\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>Thunderbird Gets a Brand New Logo<\/strong><\/a><\/p>\n<hr>\n<h2>Security And Privacy<\/h2>\n<p><strong><a href=\"https:\/\/gizmodo.com\/google-authenticator-two-factor-not-end-encrypted-1850377102\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Google’s New 2FA Isn’t End-to-End Encrypted<\/a><\/strong><\/p>\n<hr>\n<h2><a href=\"https:\/\/mintcast.org\/show-notes\/episode-413-show-notes\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Full Show Notes Can Be Found Here<\/a><\/h2>\n<h2>Wrap Up<\/h2>\n<ul>\n<li><strong>Joe<\/strong> – <a href=\"http:\/\/www.tllts.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Tllts.org<\/u><\/a>, <a href=\"http:\/\/www.linuxlugcast.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>linuxlugcast.com<\/u><\/a>, MeWe, <a href=\"mailto:jb@mintcast.org\" rel=\"noopener noreferrer\" target=\"_blank\"><u>jb@mintcast.org<\/u><\/a>, <a href=\"https:\/\/ko-fi.com\/joeeb\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Buy Joe a coffee<\/u><\/a><\/li>\n<li><strong>Moss <\/strong>– <a href=\"https:\/\/fullcirclemagazine.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Full Circle Weekly News<\/u><\/a>, <a href=\"https:\/\/distrohoppersdigest.blogspot.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Distrohoppers’ Digest<\/u><\/a>, <a href=\"mailto:bardmoss@pm.me\" rel=\"noopener noreferrer\" target=\"_blank\"><u>bardmoss@pm.me<\/u><\/a>, I’m on Mastodon as @zaivala, and other contact information can be found at <a href=\"https:\/\/itsmoss.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">It’s <\/a><a href=\"https:\/\/itsmoss.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Moss dot com<\/a><\/li>\n<li><strong>Bill <\/strong>– <a href=\"mailto:bill@mintcast.org\" rel=\"noopener noreferrer\" target=\"_blank\"><u>bill@mintcast.org<\/u><\/a>, Bill_H on Discord, @wchouser3 on Mastodon, @wchouser3 on Twitter, and wchouser3 on Facebook also – checkout my other podcasts <a href=\"https:\/\/linuxotc.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linux OTC<\/a> and <a href=\"https:\/\/3ftpodcast.org\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">3 Fat Truckers<\/a><\/li>\n<li><strong>Majid<\/strong> – drmajid@mintcast.org @atypicaldoctor on twitter, AtypicalAnaesthetist on instagram and The Atypical Anaesthetist Podcast on Spotify (https:\/\/open.spotify.com\/show\/6Uo4DsJE8fJmvo8npljbmx)<\/li>\n<\/ul>\n<h3>We would like to acknowledge some of the people who make mintCast possible:<\/h3>\n<ul>\n<li><strong>Bill Houser<\/strong> for our audio editing<\/li>\n<li><strong>Archive.org<\/strong> for hosting our audio files<\/li>\n<li><strong>Hobstar<\/strong> for our logo, <strong>initrd<\/strong> for the animated Discord logo<\/li>\n<li><strong>Londoner<\/strong> for our time syncs and various other contribution<\/li>\n<li><strong>Bill Houser<\/strong> for hosting the server which runs our website, website maintenance, and the NextCloud server on which we host our show notes and raw audio<\/li>\n<li><strong>The Linux Mint development team <\/strong>for the fine distro we love to talk about <Thanks, Clem … and co!><\/li>\n<\/ul>\n","author":"mintCast","date":"May 31, 2023","link":"https:\/\/mintcast.org\/413-flying-wigs\/","src":"https:\/\/archive.org\/download\/mintCast413\/ep413.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"2a4b9aa4b5beb4ebd3905d2ef31fe0c5","fset":"","fratio":1},"ppe-3311-10":{"title":"Linux Matters 4: Automatic for the people","description":"<p dir=\"auto\">In this episode we discuss:<\/p>\n<ul dir=\"auto\">\n<li>RSS is alive and well, and <a href=\"https:\/\/popey.com\/blog\/2023\/05\/simple-rss-mastodon-bot\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">powering<\/a> Mastodon bots<\/li>\n<li><a href=\"https:\/\/www.logitech.com\/en-gb\/products\/mice\/mx-master-3s.910-006559.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The best mouse for desktop Linux<\/a>. Possibly.<\/li>\n<li>Using the <a href=\"https:\/\/github.com\/muesli\/deckmaster\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Stream Deck to automate desktop Linux<\/a><\/li>\n<\/ul>\n<p> <\/p>\n<p dir=\"auto\">You can send your feedback via <code>show@linuxmatters.sh<\/code> or the <a href=\"https:\/\/linuxmatters.sh\/contact\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>Contact Form<\/strong><\/a>. If you’d like to hang out with other listeners and share your feedback with the community you can join:<\/p>\n<ul dir=\"auto\">\n<li>The <a href=\"https:\/\/linuxmatters.sh\/telegram\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>Linux Matters Chatters<\/strong><\/a> on Telegram.<\/li>\n<li>The <a href=\"https:\/\/discord.com\/invite\/wgQsshhrWW\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><code>#linux-matters<\/code><\/a> channel on the <a href=\"https:\/\/discord.com\/invite\/wgQsshhrWW\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>Late Night Linux Discord<\/strong><\/a> server.<\/li>\n<\/ul>\n<p> <\/p>\n<p dir=\"auto\">If you enjoy the show, please <a href=\"https:\/\/linuxmatters.sh\/support\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>consider supporting us using Patreon or PayPal<\/strong><\/a>. For $5 a month on Patreon, you can enjoy an ad-free feed of Linux Matters, or for $10, get access to all the <a href=\"https:\/\/latenightlinux.com\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Late Night Linux<\/a> family of podcasts ad-free.<\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/latenightlinux.com\/wp-content\/uploads\/2023\/04\/linuxmatters-300x300.jpeg\" alt=\"\"><\/p>\n<p><strong>RSS<\/strong>: Subscribe to the <a href=\"https:\/\/latenightlinux.com\/feeds\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">RSS feeds here<\/a><\/p>\n","author":"Late Night Linux Family All Episodes","date":"May 30, 2023","link":"https:\/\/latenightlinux.com\/linux-matters-4-automatic-for-the-people\/","src":"https:\/\/traffic.libsyn.com\/latenightlinux\/LMP4.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"bd41685af834bae6a1679947bcf02568","fset":"","fratio":1},"ppe-3311-11":{"title":"325: Open Source vs. Proprietary: An Epic Software Smackdown","description":"<p>FULL SHOW NOTES ►► <a href=\"https:\/\/tuxdigital.com\/podcasts\/destination-linux\/dl-325\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/tuxdigital.com\/podcasts\/destination-linux\/dl-325\/<\/a><\/p>\n","author":"TuxDigital Network","date":"May 30, 2023","link":"https:\/\/destinationlinux.org\/episode-325\/","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/32f28071-0b08-4ea1-afcc-37af75bd83d6\/0f0bb3a2-6204-4912-95f2-330bef409799.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"4cb7ba74218a6626609b40b5cd3afba3","fset":"","fratio":1},"ppe-3311-12":{"title":"Late Night Linux \u2013 Episode 231","description":"<p>What we’re excited about in the Linux and FOSS world, what we’re worried about, and what we can do about it. From the upcoming Plasma release to getting more young people involved. Plus what a long-standing bug with Snaps shows us about the open source ecosystem.<\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p><strong>Tailscale<\/strong><\/p>\n<p>Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly. Go to <strong><a href=\"https:\/\/tailscale.com\/?utm_source=latenightlinux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">tailscale.com<\/a> <\/strong>and try it for free on up to 100 devices.<\/p>\n<p> <\/p>\n<div>\n<div>\n<p><strong>Linode<\/strong><\/p>\n<p>Simplify your cloud infrastructure with Linode’s Linux virtual machines and develop, deploy, and scale your modern applications faster and more easily. Go to <a href=\"https:\/\/linode.com\/latenightlinux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>linode.com\/latenightlinux<\/strong><\/a> and get started with $100 credit.<\/p>\n<\/div>\n<p> <\/p>\n<div>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<div>\n<div>\n<div>\n<div>\n<p>See our <a href=\"https:\/\/latenightlinux.com\/contact\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">contact page<\/a> for ways to get in touch.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/latenightlinux.com\/wp-content\/uploads\/latenightlinux-sm.jpg\"><\/p>\n<p><strong>RSS<\/strong>: Subscribe to the <a href=\"https:\/\/latenightlinux.com\/feeds\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">RSS feeds here<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","author":"Late Night Linux Family All Episodes","date":"May 29, 2023","link":"https:\/\/latenightlinux.com\/late-night-linux-episode-231\/","src":"https:\/\/podtrac.com\/pts\/redirect.mp3\/traffic.libsyn.com\/latenightlinux\/LNL231.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"e9eeb8643ebcc72b829964c7afb00ff0","fset":"","fratio":1},"ppe-3311-13":{"title":"512: The Sound of Rust","description":"<p>We take a “Rust-only tools” challenge for a week and admit what worked, and what sucked. Plus, a surprise guest.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"http:\/\/tailscale.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale<\/a>: <a href=\"http:\/\/tailscale.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere. Get 20 devices for free for a personal account. <\/a><\/li>\n<li><a href=\"https:\/\/linode.com\/unplugged\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode Cloud Hosting<\/a>: <a href=\"https:\/\/linode.com\/unplugged\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">A special offer for all Linux Unplugged Podcast listeners and new Linode customers, visit linode.com\/unplugged, and receive $100 towards your new account. <\/a><\/li>\n<li><a href=\"https:\/\/bitwarden.com\/linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bitwarden<\/a>: <a href=\"https:\/\/bitwarden.com\/linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bitwarden is the easiest way for businesses and individuals to store, share, and sync sensitive data.<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/jupitersignal.memberful.com\/checkout?plan=52946\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support LINUX Unplugged<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.jntrnr.com\/why-i-left-rust\/\" title=\"Why I left Rust\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Why I left Rust<\/a><\/li>\n<li><a href=\"https:\/\/www.linuxfestnorthwest.org\/\" title=\"LinuxFest Northwest 2023\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">LinuxFest Northwest 2023<\/a><\/li>\n<li><a href=\"https:\/\/sessionize.com\/lfnw2023\" title=\"LinuxFest Northwest 2023 Call for Speakers\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">LinuxFest Northwest 2023 Call for Speakers<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/grapheneos\/status\/1662490320133664770?s=12&t=E9EIlRX-vHxbQ8g23lQU3A\" title=\"GrapheneOS on Twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GrapheneOS on Twitter<\/a> — GrapheneOS will be undergoing restructuring of the organization and development team. Daniel Micay has stepped down as lead developer and will be stepping down as a non-profit director. Features and security patches will continue to be delivered to users as rapidly as before.<\/li>\n<li><a href=\"https:\/\/twitter.com\/danielmicay\/status\/1662558442458955777?s=12&t=E9EIlRX-vHxbQ8g23lQU3A\" title=\"Daniel Micay on Twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Daniel Micay on Twitter<\/a> — It appears the wording above was unclear. I’m stepping down as a GrapheneOS Foundation director and as lead developer. I won’t have any leadership role in the GrapheneOS project. It will take time\/work to transfer my responsibilities to others, especially non-development roles.<\/li>\n<li><a href=\"https:\/\/www.reddit.com\/r\/degoogle\/comments\/13td3iq\/google_account_deleted_after_2_hours_of_aurora\/?utm_name=androidcss\" title=\"Google account deleted after 2 hours of Aurora\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Google account deleted after 2 hours of Aurora<\/a><\/li>\n<li><a href=\"https:\/\/adoptingbitcoin.org\/2023\/\" title=\"Adopting Bitcoin 2023\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Adopting Bitcoin 2023<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/fountain_app\/status\/1662064650156949507\" title=\"LUP on in the top 10 charts TWICE.\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">LUP on in the top 10 charts TWICE.<\/a><\/li>\n<li><a href=\"https:\/\/bitcoindadpod.fireside.fm\/\" title=\"Bitcoin Dad Pod\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bitcoin Dad Pod<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/agersant\/polaris\" title=\"Polaris\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Polaris<\/a> — Polaris is a music streaming application, designed to let you enjoy your music collection from any computer or mobile device.<\/li>\n<li><a href=\"https:\/\/demo.polaris.stream\/\" title=\"Polaris Demo\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Polaris Demo<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/ogarcia\/docker-polaris\" title=\"docker-polaris: Small docker of Polaris based on Alpine Linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">docker-polaris: Small docker of Polaris based on Alpine Linux<\/a><\/li>\n<li><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=agersant.polaris\" title=\"Polaris on Google Play\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Polaris on Google Play<\/a><\/li>\n<li><a href=\"https:\/\/f-droid.org\/packages\/agersant.polaris\/\" title=\"Polaris Android on F-Droid\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Polaris Android on F-Droid<\/a><\/li>\n<li><a href=\"https:\/\/apps.apple.com\/app\/polarios\/id1662366309\" title=\"Polarios on App Store\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Polarios on App Store<\/a><\/li>\n<li><a href=\"https:\/\/lapce.dev\/\" title=\"Lapce\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Lapce<\/a> — Lapce is written in pure Rust with a UI in Druid (which is also written in Rust). It is designed with Rope Science from the Xi-Editor which makes for lightning-fast computation, and leverages OpenGL for rendering.<\/li>\n<li><a href=\"https:\/\/flathub.org\/apps\/dev.lapce.lapce\" title=\"Lapce on Flathub\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Lapce on Flathub<\/a><\/li>\n<li><a href=\"https:\/\/search.nixos.org\/packages?channel=unstable&show=lapce&from=0&size=50&sort=relevance&type=packages&query=lapce\" title=\"Lapce packaged in Nix\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Lapce packaged in Nix<\/a><\/li>\n<li><a href=\"https:\/\/plugins.lapce.dev\/search\/\" title=\"Lapce Plugins\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Lapce Plugins<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/flosse\/text-editors-written-in-rust\" title=\"flosse\/text-editors-written-in-rust\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">flosse\/text-editors-written-in-rust<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/xi-editor\/xi-editor\" title=\"xi-editor: A modern editor with a backend written in Rust.\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">xi-editor: A modern editor with a backend written in Rust.<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/TaKO8Ki\/awesome-alternatives-in-rust\" title=\"awesome-alternatives-in-rust: A curated list of replacements for existing software written in Rust\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">awesome-alternatives-in-rust: A curated list of replacements for existing software written in Rust<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/rust-unofficial\/awesome-rust\" title=\"awesome-rust: A curated list of Rust code and resources.\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">awesome-rust: A curated list of Rust code and resources.<\/a><\/li>\n<li><a href=\"https:\/\/bitfocus.io\/companion\" title=\"BitFocus Companion\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">BitFocus Companion<\/a> — Bitfocus Companion enables the reasonably priced Elgato Streamdeck to be a professional shotbox surface for a huge amount of different presentation switchers, video playback software and broadcast equipment.<\/li>\n<li><a href=\"https:\/\/podcastindex.org\/apps?appTypes=app&elements=Value\" title=\"Podcasting 2.0 Apps\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podcasting 2.0 Apps<\/a><\/li>\n<li><a href=\"https:\/\/getalby.com\/\" title=\"Alby\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Alby<\/a><\/li>\n<li><a href=\"https:\/\/podcastindex.org\/podcast\/575694\" title=\"LINUX Unplugged on the Podcastindex.org\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">LINUX Unplugged on the Podcastindex.org<\/a><\/li>\n<li><a href=\"https:\/\/flathub.org\/apps\/io.github.Sebicodes99.Prt\" title=\"Pick: Please Run That\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Pick: Please Run That<\/a> — A Python socket app for letting a friend execute a command on your system without using a ssh server all, with a simple GUI It has active development and works OOTB.<\/li>\n<li><a href=\"https:\/\/gitlab.gnome.org\/philippun1\/turtlegit\" title=\"Pick: turtle\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Pick: turtle<\/a> — Turtle is a gtk4 + libadwaita frontend for pygit2 with nautilus plugin support. The project is currently in a very early development stage.<\/li>\n<li><a href=\"https:\/\/www.meremortalspodcast.com\/podcast\/episode\/7eb82808\/chris-fisher-or-the-future-of-advertising-adopting-value-for-value-and-creating-jupiter-broadcasting\" title=\"Chris Interviewed on Mere Mortals\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Chris Interviewed on Mere Mortals<\/a> — In Conversation #90, Chris and I discuss: what it’s been like to have 25+ podcasts, the current nosedive in advertising, how value for value is creating a richer experience for podcasters, his mindset in analyzing technological ideas, the coming pain from the messed up financial system, why Bitcoin\/AI won’t be as impactful as the internet and traveling across the US in an RV.<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 29, 2023","link":"https:\/\/linuxunplugged.com\/512","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/f31a453c-fa15-491f-8618-3f71f1d565e5\/38317c5e-8541-447c-9bdb-bdb64923deea.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"988dbf0633e34aac9f52dae602bfd7d5","fset":"","fratio":1},"ppe-3311-14":{"title":"Episode 377 – The world is changing too fast for humans to understand","description":"<p dir=\"auto\"><a href=\"https:\/\/mastodon.social\/@joshbressers\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Josh<\/a> and <a href=\"https:\/\/mastodon.social\/@kurtseifried\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kurt<\/a> talk about PyPI suspending new accounts and packages for a day, and a 60 minutes story about deepfakes. The problems are mostly the same, but for very different reasons. The world is changing faster than we can keep up, so what is a human to do?<\/p>\n<h2 dir=\"auto\">Show Notes<\/h2>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/thehackernews.com\/2023\/05\/pypi-repository-under-attack-user-sign.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">PyPI Repository Under Attack: User Sign-Ups and Package Uploads Temporarily Halted<\/a>](<a href=\"https:\/\/thehackernews.com\/2023\/05\/pypi-repository-under-attack-user-sign.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/thehackernews.com\/2023\/05\/pypi-repository-under-attack-user-sign.html<\/a>)<\/li>\n<li><a href=\"https:\/\/infosec.exchange\/@racheltobac\/110415331029231207\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">60 minutes reporter voice clone<\/a><\/li>\n<li><a href=\"https:\/\/www.corridordigital.com\/season\/11\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Cooridor Crew deepfakes<\/a><\/li>\n<li><a href=\"https:\/\/news.ycombinator.com\/item?id=27728287\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Certificate bit flip<\/a><\/li>\n<li><a href=\"https:\/\/www.penny-arcade.com\/comic\/2006\/07\/12\/a-wider-perspective-on-flavor\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Candy is delicious<\/a><\/li>\n<\/ul>\n","author":"","date":"May 29, 2023","link":"https:\/\/opensourcesecuritypodcast.libsyn.com\/episode-377-the-world-is-changing-too-fast-for-humans-to-understand","src":"https:\/\/traffic.libsyn.com\/secure\/opensourcesecuritypodcast\/Episode_377_The_world_is_changing_too_fast_for_humans_to_understand.mp3?dest-id=542864","featured":"","mediatype":"audio","duration":"00:00","key":"bda14a7cc4a1e99e39b2821cd87af8cb","fset":"","fratio":1},"ppe-3311-15":{"title":"Linux After Dark \u2013 Episode 44","description":"<p>We try to imagine what the future holds for our young kids, and realise how much the tech world has changed since we were young. Plus building a dirt cheap NAS, and more.<\/p>\n<p> <\/p>\n<p> <\/p>\n<p><b>ServerMania<\/b><\/p>\n<p>ServerMania offers a wide range of fully customizable dedicated, cloud, colocation, and IP Transit services, and free initial consultations. Go to <a href=\"http:\/\/servermania.com\/lad\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><b>servermania.com\/lad<\/b><\/a> and use the promo code <b>linuxafterdark<\/b> to get 15% off dedicated servers – recurring for life.<\/p>\n<p> <\/p>\n<p><strong>HelloFresh<\/strong><\/p>\n<p>With HelloFresh, you get farm-fresh, pre-portioned ingredients and seasonal recipes delivered right to your doorstep. Get 16 free meals plus free shipping at <a href=\"https:\/\/hellofresh.com\/linuxafterdark16\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>hellofresh.com\/linuxafterdark16<\/strong><\/a> using the promo code linuxafterdark16.<\/p>\n<p> <\/p>\n<p><strong>Tailscale<\/strong><\/p>\n<p>Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly. Go to <strong><a href=\"https:\/\/tailscale.com\/?utm_source=linuxafterdark\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">tailscale.com<\/a> <\/strong>and try it for free on up to 100 devices.<\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p>See our <a href=\"https:\/\/linuxafterdark.net\/contact\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">contact page<\/a> for ways to get in touch.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/linuxafterdark.net\/wp-content\/uploads\/2022\/07\/LAD-300-300x300.jpg\" alt=\"\"><\/p>\n<p>Subscribe to the <a href=\"https:\/\/linuxafterdark.net\/feed\/podcast\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">RSS feed<\/a>.<\/p>\n","author":"Late Night Linux Family All Episodes","date":"May 26, 2023","link":"https:\/\/latenightlinux.com\/linux-after-dark-episode-44\/","src":"https:\/\/podtrac.com\/pts\/redirect.mp3\/traffic.libsyn.com\/latenightlinux\/LAD44.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"8cdf8a4a78bf604f8b4be09f4655f08d","fset":"","fratio":1},"ppe-3311-16":{"title":"Episode 196","description":"<h2>Overview<\/h2>\n<p>This week we look at some recent security developments from PyPI, the Linux<br \/>\nSecurity Summit North America and the pending transition of Ubuntu 18.04 to ESM,<br \/>\nplus we cover security updates for cups-filter, the Linux kernel, Git, runC,<br \/>\nncurses, cloud-init and more.<\/p>\n<h2>This week in Ubuntu Security Updates<\/h2>\n<p>83 unique CVEs addressed<\/p>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6083-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6083-1<\/a>] cups-filters vulnerability (01:03)<\/h3>\n<ul>\n<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-24805\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-24805<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Legacy BEH (Backend Error Handler) allows to create a network accessible<br \/>\nprinter – allowed to do pretty easy RCE since used <code>system()<\/code> to run a command<br \/>\nwhich contained various values that can be controlled by the attacker<\/li>\n<li>Fixed by upstream to use <code>fork()<\/code> and <code>execve()<\/code> plus some other smaller changes<br \/>\nto perform sanitisation of the input<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6084-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6084-1<\/a>] Linux kernel vulnerabilities (01:45)<\/h3>\n<ul>\n<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1118\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1118<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32269\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32269<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1513\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1513<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0459\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0459<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>4.15 18.04 GCP + Oracle, 16.04 Oracle<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6085-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6085-1<\/a>] Linux kernel (Raspberry Pi) vulnerabilities (02:00)<\/h3>\n<ul>\n<li>10 CVEs addressed in Jammy (22.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1118\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1118<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32269\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32269<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-20938\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-20938<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1513\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1513<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1078\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1078<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1075\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1075<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0459\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0459<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3707\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3707<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-27672\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-27672<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>5.15 Raspi kernel<\/li>\n<li>Various UAFs in different drivers and subsystems, possible speculative<br \/>\nexecution attack against AMD x86-64 processors with SMT enabled, a few type<br \/>\nconfusion bugs leading to OOB reads etc<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6090-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6090-1<\/a>] Linux kernel vulnerabilities (02:26)<\/h3>\n<ul>\n<li>10 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1118\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1118<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32269\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32269<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-20938\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-20938<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1513\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1513<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1078\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1078<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1075\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1075<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0459\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0459<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3707\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3707<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-27672\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-27672<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Same set of vulns as above<\/li>\n<li>5.15 22.04 GKE, GCP; 20.04 GKE, GCP, Oracle<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6089-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6089-1<\/a>] Linux kernel (OEM) vulnerability (02:45)<\/h3>\n<ul>\n<li>1 CVEs addressed in Jammy (22.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4139\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4139<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>6.0 OEM<\/li>\n<li>i915 failed to flush GPU TLB in some cases -> DoS \/ RCE<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6091-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6091-1<\/a>] Linux kernel vulnerabilities (03:09)<\/h3>\n<ul>\n<li>25 CVEs addressed in Kinetic (22.10)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1118\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1118<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32269\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32269<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-26544\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-26544<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-23455\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-23455<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-23454\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-23454<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21106\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21106<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21102\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21102<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1652\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1652<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1513\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1513<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1078\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1078<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1075\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1075<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1074\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1074<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1073\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1073<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0459\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0459<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0458\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0458<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0394\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0394<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0210\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0210<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-48424\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-48424<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-48423\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-48423<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4842\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4842<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4129\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4129<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3707\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3707<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-36280\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-36280<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-27672\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-27672<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>5.19 IBM + Oracle<\/li>\n<li>Lots of the previously mentioned issues and more – same kinds of issues though<br \/>\n(race conditions, UAFs, OOB writes etc in various drivers \/ subsystems)<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6096-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6096-1<\/a>] Linux kernel vulnerabilities (03:34)<\/h3>\n<ul>\n<li>25 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1118\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1118<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32269\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32269<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-26544\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-26544<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-23455\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-23455<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-23454\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-23454<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21106\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21106<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21102\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21102<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1652\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1652<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1513\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1513<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1078\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1078<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1075\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1075<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1074\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1074<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1073\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1073<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0459\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0459<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0458\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0458<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0394\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0394<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0210\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0210<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-48424\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-48424<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-48423\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-48423<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4842\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4842<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4129\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4129<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3707\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3707<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-36280\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-36280<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-27672\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-27672<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>22.10 GCP, 22.04 HWE<\/li>\n<li>Same as above<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6092-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6092-1<\/a>] Linux kernel (Azure) vulnerabilities (03:45)<\/h3>\n<ul>\n<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1118\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1118<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32269\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32269<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1513\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1513<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0459\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0459<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>4.15 Azure on both 18.04, 16.04 ESM + 14.04 ESM<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6093-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6093-1<\/a>] Linux kernel (BlueField) vulnerabilities (03:54)<\/h3>\n<ul>\n<li>9 CVEs addressed in Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-26545\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-26545<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1074\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1074<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1073\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1073<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0458\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0458<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4129\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4129<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3903\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3903<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3108\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3108<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1281\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1281<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1829\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1829<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>5.4<\/li>\n<li>NVIDIA BlueField platform<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6094-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6094-1<\/a>] Linux kernel vulnerabilities (04:02)<\/h3>\n<ul>\n<li>8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1118\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1118<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32269\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32269<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1513\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1513<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1078\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1078<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1075\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1075<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0459\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0459<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3707\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3707<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>5.4 20.04 \/ 18.04 HWE on all generic, Azure, GKE, IBM, OEM, AWS, KVM, Low<br \/>\nlatency etc<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6095-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6095-1<\/a>] Linux kernel vulnerabilities (04:29)<\/h3>\n<ul>\n<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1118\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1118<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32269\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32269<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1513\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1513<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0459\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0459<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>4.15 18.04 snapdragon + raspi2; 16.04 HWE etc<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6050-2\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6050-2<\/a>] Git vulnerabilities (04:50)<\/h3>\n<ul>\n<li>2 CVEs addressed in Xenial ESM (16.04 ESM)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-29007\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-29007<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-25652\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-25652<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>RCE via a crafted <code>.gitmodules<\/code> file with submodule URLs longer than 1024<br \/>\nchars – could inject arbitrary config into the users git config – eg. could<br \/>\nconfigure the pager or editor etc to run some arbitrary command<\/li>\n<li>Local file overwrite via crafted input to <code>git apply --reject<\/code><\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6088-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6088-1<\/a>] runC vulnerabilities (05:39)<\/h3>\n<ul>\n<li>3 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-28642\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-28642<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-27561\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-27561<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-25809\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-25809<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Vuln where the cgroup hierarchy of the host may be exposed within the<br \/>\ncontainer and be writable – could possibly use this to privesc<\/li>\n<li>Regression from a previous vuln fix in CVE-2019-19921 (see <a href=\"https:\/\/news.open-fab.org\/episode-66\/#usn-4297-1-runc-vulnerabilities-01-30\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">[USN-4297-1] runC vulnerabilities in Episode 66<\/a>)<\/li>\n<li>Possible to bypass AppArmor (or SELinux) restrictions on runc if a container<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6088-2\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6088-2<\/a>] runC vulnerabilities (06:26)<\/h3>\n<ul>\n<li>6 CVEs addressed in Xenial ESM (16.04 ESM)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-28642\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-28642<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-27561\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-27561<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-25809\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-25809<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-29162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-29162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-43784\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-43784<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2019-19921\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2019-19921<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6086-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6086-1<\/a>] minimatch vulnerability (06:31)<\/h3>\n<ul>\n<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3517\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3517<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>ReDoS against nodejs package<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6087-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6087-1<\/a>] Ruby vulnerabilities (06:39)<\/h3>\n<ul>\n<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-28756\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-28756<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-28755\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-28755<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Speaking of ReDoS – two in ruby – mentioned previously in<br \/>\n<a href=\"https:\/\/news.open-fab.org\/episode-194\/#usn-6055-2-ruby-regression--03-11\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">[USN-6055-2] Ruby regression Episode 194<\/a> – has been<br \/>\nfixed properly now without introducing the previous regression<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-5900-2\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-5900-2<\/a>] tar vulnerability (07:03)<\/h3>\n<ul>\n<li>1 CVEs addressed in Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-48303\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-48303<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/news.open-fab.org\/episode-189\/#usn-5900-1-tar-vulnerability-06-15\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">[USN-5900-1] tar vulnerability from Episode 189<\/a><\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-5996-2\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-5996-2<\/a>] Libloius vulnerabilities (07:17)<\/h3>\n<ul>\n<li>3 CVEs addressed in Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-26769\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-26769<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-26768\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-26768<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-26767\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-26767<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Braille translation library<\/li>\n<li>3 different buffer overflows<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6099-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6099-1<\/a>] ncurses vulnerabilities (07:27)<\/h3>\n<ul>\n<li>5 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-29491\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-29491<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-29458\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-29458<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-39537\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-39537<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2019-17595\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2019-17595<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2019-17594\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2019-17594<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Most interesting vuln here was possible memory corruption via malformed<br \/>\nterminfo database which can be set via <code>TERMINFO<\/code> of though <code>~\/.terminfo<\/code> – will<br \/>\nget used by a <code>setuid<\/code> binary as well – turns out though that ncurses has a<br \/>\nbuild-time configuration option to disable the use of custom terminfo\/termcap<br \/>\nwhen running – fixed this by enabling that<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6073-6\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6073-6<\/a>, <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6073-7\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6073-7<\/a>, <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6073-8\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6073-8<\/a>, USN-6073-9] Cinder, Glance store, Nova, os-brick regressions (08:34)<\/h3>\n<ul>\n<li>Affecting Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)<\/li>\n<li><a href=\"https:\/\/news.open-fab.org\/episode-195\/#usn-6073-1-usn-6073-2-usn-6073-3-usn-6073-4-cinder-glance-store-nova-os-brick-vulnerability--03-14\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">[USN-6073-1, USN-6073-2, USN-6073-3, USN-6073-4] Cinder, Glance Store, Nova, os-brick vulnerability from Episode 195<\/a><\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-5725-2\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-5725-2<\/a>] Go vulnerability (08:50)<\/h3>\n<ul>\n<li>1 CVEs addressed in Xenial ESM (16.04 ESM)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2020-16845\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2020-16845<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6042-2\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6042-2<\/a>] Cloud-init regression (08:55)<\/h3>\n<ul>\n<li>Affecting Focal (20.04 LTS)<\/li>\n<li>Published an update to cloud-init a few weeks ago – this was due to a vuln<br \/>\nwhere credentials may get accidentally logged to the cloud-init log file –<br \/>\nthis was a newer version of cloud-init and it relied on a feature in the<br \/>\nnetplan package that was not published to the security pocket – easy fix would<br \/>\nbe to publish this version of netplan to -security but this is not in the<br \/>\nspirit of the pocket – so instead cloud-init was updated to include a fallback<br \/>\nto ensure routes were appropriately retained<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6098-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6098-1<\/a>] Jhead vulnerabilities (09:48)<\/h3>\n<ul>\n<li>8 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-28278\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-28278<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-28276\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-28276<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2020-26208\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2020-26208<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2020-6625\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2020-6625<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2020-6624\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2020-6624<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2019-1010302\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2019-1010302<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2019-1010301\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2019-1010301<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2019-19035\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2019-19035<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>EXIF JPEG header manipulation tool written in C<\/li>\n<li>Heap buffer overflows, NULL ptr derefs, OOB reads etc<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6102-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6102-1<\/a>] xmldom vulnerabilities (10:12)<\/h3>\n<ul>\n<li>3 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-39353\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-39353<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-37616\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-37616<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-21366\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-21366<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>NodeJS javascript DOMParser and XMLSerializer<\/li>\n<li>Logic error where failed to preserve identifiers or namespaces when parsing<br \/>\nmalicious documents<\/li>\n<li>Prototype pollution<\/li>\n<li>Parses documents with multiple top-level elements and combines all their<br \/>\nelements<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6101-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6101-1<\/a>] GNU binutils vulnerabilities (10:50)<\/h3>\n<ul>\n<li>6 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-25588\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-25588<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-25586\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-25586<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-25585\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-25585<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-25584\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-25584<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1972\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1972<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1579\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1579<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Assembler, linker and other utils for handling binary files<\/li>\n<li>Generally not expected to be fed untrusted input, but notheless\n<ul>\n<li>various buffer overflows (read and write) – DoS \/ RCE<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6074-3\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6074-3<\/a>] Firefox regressions (11:38)<\/h3>\n<ul>\n<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32209\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32209<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32208\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32208<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32206\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32206<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32216\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32216<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32215\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32215<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32213\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32213<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32212\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32212<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32211\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32211<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32210\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32210<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32207\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32207<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32205\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32205<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>113.0.2<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6103-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6103-1<\/a>] JSON Schema vulnerability (11:50)<\/h3>\n<ul>\n<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-3918\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-3918<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>NodeJS package for JSON document manipulation – prototype pollution vuln\n<ul>\n<li><a href=\"https:\/\/news.open-fab.org\/episode-192\/#usn-5967-1-object-path-vulnerabilities-02-11\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">[USN-5967-1] object-path vulnerabilities from Episode 192<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Goings on in Ubuntu Security Community<\/h2>\n<h3>Security related announcements from PyPI (12:21)<\/h3>\n<ul>\n<li>\n<p><a href=\"https:\/\/blog.pypi.org\/posts\/2023-05-23-removing-pgp\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Removing PGP from PyPI<\/a><\/p>\n<ul>\n<li>will no longer support new PGP signatures for PyPI packages in response to a<br \/>\nrecent <a href=\"https:\/\/blog.yossarian.net\/2023\/05\/21\/PGP-signatures-on-PyPI-worse-than-useless\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">public blog post<\/a> detailing an audit of the PGP ecosystem with PyPI<\/p>\n<ul>\n<li>most devs not uploading PGP signatures and of those that were, 30% were<br \/>\nnot available on major public keyservers and of those that were nearly<br \/>\nhalf were not able to be meaningfully verified – some had expired,<br \/>\nothers had no binding signature to be able to verify them<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\n<p><a href=\"https:\/\/blog.pypi.org\/posts\/2023-05-24-pypi-was-subpoenaed\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">PyPI was subpoenaed<\/a><\/p>\n<ul>\n<li>Ordered by DOJ to provide details on 5 PyPI usernames, including names,<br \/>\naddresses, connection records, payment details, which packages and IP logs<br \/>\netc<\/li>\n<li>Provided these details after consulting with their lawyers<\/li>\n<li>Includes the specific attributes which were provided including the database<br \/>\nqueries used to lookup those records<\/li>\n<li>likely in response to recent security issues like typosquatting of popular<br \/>\npackages with credential stealers and other malware embedded – over the past<br \/>\nweekend, account sign-up and package uploads were blocked due to an<br \/>\noverwhelming large number of malicious users and projects being created<br \/>\nwhich the admins could not keep up with<\/li>\n<\/ul>\n<\/li>\n<li>\n<p><a href=\"https:\/\/blog.pypi.org\/posts\/2023-05-25-securing-pypi-with-2fa\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Securing PyPI accounts via Two-Factor Authentication<\/a><\/p>\n<ul>\n<li>Every account that maintains a project \/ organisation will be required to<br \/>\nenable 2FA by the end of this year<\/p>\n<ul>\n<li>supports both TOTP and WebAuthN<\/li>\n<\/ul>\n<\/li>\n<li>Already announced this for most critical projects <a href=\"https:\/\/pypi.org\/security-key-giveaway\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">last year<\/a> where they gave<br \/>\naway Google Titan security keys to those projects and mandated them to use<br \/>\n2FA<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>LSS NA 2023 (16:11)<\/h3>\n<ul>\n<li>Attended by John Johansen and Mark Esler from the Ubuntu Security Team<\/li>\n<li>John presented in the <a href=\"https:\/\/youtu.be\/7wkEWeRIwy8\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">LSM Maintainers Panel<\/a> with Mickaël Salaün, Casey<br \/>\nSchaufler, Mimi Zohar & moderated by Paul Moore<\/li>\n<li>All presentations now online: <a href=\"https:\/\/www.youtube.com\/playlist?list=PLbzoR-pLrL6q4vmwFP7-ZZ1LJc5mA3Hqu\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/www.youtube.com\/playlist?list=PLbzoR-pLrL6q4vmwFP7-ZZ1LJc5mA3Hqu<\/a><\/li>\n<li>Lots of interesting bits like:\n<ul>\n<li><a href=\"https:\/\/youtu.be\/Qc75hobVjbo\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">systemd and TPM2<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/ewmMs563jv0\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Verifiable End to End Secure OCI Native Machines<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/V2kzptQG5_A\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Progress on Bounds Checking in C and the Linux Kernel<\/a>\n<ul>\n<li>for more great content with Kees check out <a href=\"https:\/\/news.open-fab.org\/episode-145\/#seth-and-john-talk-linux-kernel-security-with-kees-cook-06-53\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Seth and John talk Linux Kernel Security with Kees Cook from Episode 145<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/youtu.be\/OzyalrOzxE8\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Building the Largest Working Set of Apparmor Profiles<\/a><\/li>\n<li><a href=\"https:\/\/youtu.be\/UB10wtNEMlM\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Controlling Script Execution<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Announcement of 18.04 LTS going into ESM on 31 May 2023 (18:55)<\/h3>\n<ul>\n<li><a href=\"https:\/\/lists.ubuntu.com\/archives\/ubuntu-security-announce\/2023-May\/007371.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/lists.ubuntu.com\/archives\/ubuntu-security-announce\/2023-May\/007371.html<\/a><\/li>\n<li>18.04 LTS released on 26 April 2018<\/li>\n<li><a href=\"https:\/\/canonical.com\/blog\/18-04-end-of-standard-support\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/canonical.com\/blog\/18-04-end-of-standard-support<\/a><\/li>\n<\/ul>\n<h2>Get in contact<\/h2>\n<ul>\n<li><a href=\"mailto:security@ubuntu.com\" rel=\"noopener noreferrer\" target=\"_blank\">security@ubuntu.com<\/a><\/li>\n<li><a href=\"https:\/\/libera.chat\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">#ubuntu-security on the Libera.Chat IRC network<\/a><\/li>\n<li><a href=\"https:\/\/lists.ubuntu.com\/mailman\/listinfo\/ubuntu-hardened\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">ubuntu-hardened mailing list<\/a><\/li>\n<li><a href=\"https:\/\/discourse.ubuntu.com\/c\/security\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Security section on discourse.ubuntu.com<\/a><\/li>\n<li><a href=\"https:\/\/fosstodon.org\/@ubuntusecurity\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">@ubuntusecurity<\/a>, <a href=\"https:\/\/twitter.com\/ubuntu_sec\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">@ubuntu_sec on twitter<\/a><\/li>\n<\/ul>\n","author":"Ubuntu Security Team","date":"May 26, 2023","link":"https:\/\/ubuntusecuritypodcast.org\/episode-196\/","src":"https:\/\/people.canonical.com\/~amurray\/USP\/USP_E196.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"b87a0569ec7c8c20c7d73ed61707192e","fset":"","fratio":1},"ppe-3311-17":{"title":"Linux Action News 294","description":"<p>Microsoft’s new Linux server distro, Red Hat Summit 2023 highlights, big changes at CodeWeavers, and Podman catches up to Docker Desktop.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"http:\/\/linode.com\/lan\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode<\/a>: <a href=\"http:\/\/linode.com\/lan\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Sign up using the link on this page and receive a $100 60-day credit towards your new account. <\/a><\/li>\n<li><a href=\"https:\/\/l.kolide.co\/3klbWzr\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kolide<\/a>: <a href=\"https:\/\/l.kolide.co\/3klbWzr\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kolide can help you nail third-party audits and internal compliance goals with endpoint security for your entire fleet. <\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.jupiter.party\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support Linux Action News<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.redhat.com\/en\/blog\/podman-desktop-10-next-gen-container-management-solution-streamlining-developers-container-operations\" title=\"Podman Desktop 1.0 Annouced\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podman Desktop 1.0 Annouced<\/a> — Podman Desktop offers a user-friendly interface for handling containers and integrating with Kubernetes from a local workstation. <\/li>\n<li><a href=\"http:\/\/podman.io\/\" title=\"Podman.io\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podman.io<\/a><\/li>\n<li><a href=\"https:\/\/podman.io\/\" title=\"Podman\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podman<\/a><\/li>\n<li><a href=\"https:\/\/developers.redhat.com\/articles\/2023\/05\/23\/podman-desktop-now-generally-available?extIdCarryOver=true&sc_cid=701f2000001OH6kAAG\" title=\"Podman Desktop 1.0: Local container development made easy\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podman Desktop 1.0: Local container development made easy<\/a><\/li>\n<li><a href=\"https:\/\/www.phoronix.com\/news\/Podman-Desktop-1.0\" title=\"Podman Desktop 1.0 Released As An Alternative To Docker Desktop\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podman Desktop 1.0 Released As An Alternative To Docker Desktop<\/a><\/li>\n<li><a href=\"https:\/\/developers.redhat.com\/articles\/2023\/05\/23\/podman-desktop-now-generally-available\" title=\"Podman Desktop 1.0: Local container development made easy\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podman Desktop 1.0: Local container development made easy<\/a><\/li>\n<li><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-infrastructure-blog\/introducing-the-azure-linux-container-host-for-aks\/ba-p\/3824101\" title=\"Introducing Azure Linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Introducing Azure Linux<\/a> — This General Availability announcement follows our October preview announcement under the CBL-Mariner project codename. We’d like to thank the customers who provided valuable feedback and insight during our preview. <\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-linux\/intro-azure-linux\" title=\"Introduction to the Azure Linux Container Host for AKS | Microsoft Learn\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Introduction to the Azure Linux Container Host for AKS | Microsoft Learn<\/a><\/li>\n<li><a href=\"https:\/\/www.codeweavers.com\/blog\/jwhite\/2023\/5\/19\/a-new-chapter-for-codeweavers-and-myself-trust-me\" title=\"CodeWeavers An Employee Ownership Trust\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CodeWeavers An Employee Ownership Trust<\/a> — As of April 12th, the the company has a new shareholder – the CodeWeavers Purpose Trust. This Trust will become the primary owner of CodeWeavers.<\/li>\n<li><a href=\"https:\/\/www.phoronix.com\/news\/CodeWeavers-Employee-Trust\" title=\"CodeWeavers Now Controlled By An Employee Ownership Trust\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CodeWeavers Now Controlled By An Employee Ownership Trust<\/a><\/li>\n<li><a href=\"https:\/\/www.spiceworks.com\/tech\/tech-general\/articles\/red-hat-summit-2023-key-highlights\/\" title=\"Red Hat Summit 2023 — Highlights\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Red Hat Summit 2023 — Highlights<\/a> — The Red Hat Summit 2023 witnessed the launch of OpenShift AI and Red Hat Ansible software, security cloud services, and Linux management features.<\/li>\n<li><a href=\"https:\/\/www.redhat.com\/en\/blog\/moment-ai\" title=\"The moment for AI\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The moment for AI<\/a><\/li>\n<li><a href=\"https:\/\/www.redhat.com\/en\/blog\/automation-and-ai-revolution\" title=\"Automation and the AI revolution\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Automation and the AI revolution<\/a> — Generative AI is everywhere. But I cannot overstate how different our approach to all this has been.<\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=mdn5NESGERg\" title=\"Red Hat Summit 2023: Adolfo Rodriguez, Advance Auto Parts - YouTube\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Red Hat Summit 2023: Adolfo Rodriguez, Advance Auto Parts – YouTube<\/a> — Adolfo Rodriguez, SVP of Technology Transformation at Advance Auto Parts joins theCUBE hosts John Furrier & Rob Strechay for our continuing coverage of Red Hat Summit 2023<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 25, 2023","link":"https:\/\/linuxactionnews.com\/294","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/dec90738-e640-45e5-b375-4573052f4bf4\/e917ee57-3c60-484a-8951-a260f1875db0.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"f42f6f3c9825c0ebf1adf27a40767bf5","fset":"","fratio":1},"ppe-3311-18":{"title":"508: Foundational Proceedings","description":"<p>FreeBSD Foundation Welcomes New Team Members, OpenZFS the Ideal Storage Solution for University Environments, SCaLE20X Conference Report, 916 days of Emacs, XTerm: It’s Better Than You Thought, NetBSD Annual General Meeting 2023, and more<\/p>\n<p><em>NOTES<\/em>**<br \/>\nThis episode of BSDNow is brought to you by <a href=\"https:\/\/www.tarsnap.com\/bsdnow\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tarsnap<\/a> and the <a href=\"https:\/\/www.patreon.com\/bsdnow\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">BSDNow Patreon<\/a><\/p>\n<h2>Headlines<\/h2>\n<h3><a href=\"https:\/\/freebsdfoundation.org\/blog\/freebsd-foundation-welcomes-new-team-members\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">FreeBSD Foundation Welcomes New Team Members<\/a><\/h3>\n<hr>\n<h3><a href=\"https:\/\/klarasystems.com\/articles\/openzfs-what-makes-openzfs-the-ideal-storage-solution-for-university-environments\/\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">What Makes OpenZFS the Ideal Storage Solution for University Environments<\/a><\/h3>\n<hr>\n<h2>News Roundup<\/h2>\n<h3><a href=\"https:\/\/freebsdfoundation.org\/blog\/scale20x-conference-report\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">SCaLE20X Conference Report<\/a><\/h3>\n<hr>\n<h3><a href=\"https:\/\/sqrtminusone.xyz\/posts\/2023-04-13-emacs\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">916 days of Emacs<\/a><\/h3>\n<hr>\n<h3><a href=\"https:\/\/aduros.com\/blog\/xterm-its-better-than-you-thought\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">XTerm: It’s Better Than You Thought<\/a><\/h3>\n<hr>\n<h3><a href=\"https:\/\/mail-index.netbsd.org\/netbsd-announce\/2023\/05\/05\/msg000348.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">NetBSD AGM2023: Annual General Meeting, May 13, 21:00 UTC<\/a><\/h3>\n<hr>\n<h3>Tarsnap<\/h3>\n<ul>\n<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.<\/li>\n<\/ul>\n<h2>Feedback\/Questions<\/h2>\n<ul>\n<li><a href=\"https:\/\/github.com\/BSDNow\/bsdnow.tv\/blob\/master\/episodes\/508\/feedback\/Adrian%20-%20Tilde.md\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Adrian – Tilde<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/BSDNow\/bsdnow.tv\/blob\/master\/episodes\/508\/feedback\/Dan%20-%20Root%20Shell.md\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Dan – Root Shell<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/BSDNow\/bsdnow.tv\/blob\/master\/episodes\/508\/feedback\/Florian%20-%20Salt%20Extension.md\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Florian – Salt Extension<\/a><\/li>\n<\/ul>\n<hr>\n<ul>\n<li>Send questions, comments, show ideas\/topics, or stories you want mentioned on the show to <a href=\"mailto:feedback@bsdnow.tv\" rel=\"noopener noreferrer\" target=\"_blank\">feedback@bsdnow.tv<\/a><br \/>\n***<\/li>\n<\/ul>\n","author":"Allan Jude","date":"May 25, 2023","link":"https:\/\/www.bsdnow.tv\/508","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/c91b88f1-e824-4815-bcb8-5227818d6010\/def7d8d8-31e8-4874-bbe5-dd25729dd001.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"b92ce2056fc05cb0368d0989169112dd","fset":"","fratio":1},"ppe-3311-19":{"title":"The Linux Link Tech Show Episode 1005","description":"<p>joel joins the discord.<\/p>\n","author":"dann@thelinuxlink.net (Dann Washko, Linc Fessenden, Pat Davila, Allan Metzler)","date":"May 25, 2023","link":"http:\/\/www.tllts.org","src":"http:\/\/www.tlltsarchive.org\/archives\/tllts_1005-05-24-23.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"33c01487d05acb9e1be35af21ba743fb","fset":"","fratio":1},"ppe-3311-20":{"title":"Episode 103: Fun Quail","description":"<p>Episode edited by <a href=\"https:\/\/www.paritybit.ca\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Jake Bauer<\/a> — thanks!<\/p>\n<p>Discuss the episode on our <a href=\"https:\/\/forum.linuxlads.com\/d\/30-e103-fun-quail\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">forum<\/a><\/p>\n<h3>Discussion<\/h3>\n<p>We talk to Ciarán about <s>entertaining avians<\/s> <s>cetaceans prone to disco<\/s> music publication and cataloguing system based on ActivityPub, creating specs for podcast syncing API, Star Trek, life, the Universe and everything.<\/p>\n<h4>Funkwhale<\/h4>\n<ul>\n<li>\n<p><a href=\"https:\/\/funkwhale.audio\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Funkwhale<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/They_Might_Be_Giants\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">They Might Be Giants<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/groovesharks.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Grooveshark<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.jamendo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Jamendo<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/castopod.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Castopod<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/owncast.online\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Owncast<\/a><\/p>\n<\/li>\n<li>\n<p>Find instances using this <a href=\"https:\/\/network.funkwhale.audio\/dashboards\/d\/overview\/funkwhale-network-overview\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">dashboard<\/a><\/p>\n<\/li>\n<li>\n<p>The <a href=\"https:\/\/open.audio\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">flagship instance<\/a><\/p>\n<\/li>\n<li>\n<p>Ciarán’s <a href=\"https:\/\/tanukitunes.com\/about\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">own instance<\/a><\/p>\n<\/li>\n<li>\n<p>Funkwhale’s <a href=\"https:\/\/dev.funkwhale.audio\/funkwhale\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Gitlab repo<\/a><\/p>\n<\/li>\n<\/ul>\n<h4>Open Podcast API<\/h4>\n<ul>\n<li>\n<p><a href=\"https:\/\/openpodcastapi.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Open Podcast API<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/gpodder.net\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">gPodder<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/antennapod.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">AntennaPod<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/apps.kde.org\/kasts\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">KDE Kasts<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/web.podfriend.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">PodFriend<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/github.com\/thrillfall\/nextcloud-gpodder\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">nextcloud-gpodder<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/github.com\/Podcastindex-org\/podcast-namespace\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podcasting 2.0<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/podverse.fm\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podverse<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/pocketcasts.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Pocket Casts<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.redhat.com\/en\/topics\/api\/what-is-a-rest-api\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">REST API<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/retribute.me\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Retribute<\/a>, wealth sharing platform<\/p>\n<\/li>\n<li>\n<p>W3C <a href=\"https:\/\/www.w3.org\/TR\/payment-request\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Payment Request API<\/a><\/p>\n<\/li>\n<\/ul>\n<h4>Star Trek<\/h4>\n<ul>\n<li>\n<p><a href=\"https:\/\/www.imdb.com\/title\/tt8806524\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Star Trek Picard<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.imdb.com\/title\/tt0060028\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The Original Series<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.imdb.com\/title\/tt0092455\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">TNG<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.imdb.com\/title\/tt0106145\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">DS9<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.imdb.com\/title\/tt0112178\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Voyager<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.imdb.com\/title\/tt0244365\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Enterprise<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.imdb.com\/title\/tt5171438\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Discovery<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.imdb.com\/title\/tt9184820\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Lower Decks<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.redlettermedia.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Red Letter Media<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.imdb.com\/title\/tt3230854\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The Expanse<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.imdb.com\/title\/tt0118480\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Stargate SG-1<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.imdb.com\/title\/tt0303461\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Firefly<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Cowboy_Bebop\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Cowboy Bebop<\/a><\/p>\n<\/li>\n<li>\n<p>The Irish unification is happening <a href=\"https:\/\/www.youtube.com\/watch?v=IbSGp4WIBsQ\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">next year<\/a><\/p>\n<\/li>\n<\/ul>\n<h4>Catch up with Ciarán<\/h4>\n<ul>\n<li>\n<p>Ciarán is on <a href=\"https:\/\/fosstodon.org\/@cda\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Mastodon<\/a> <\/p>\n<\/li>\n<li>\n<p>So is <a href=\"https:\/\/fosstodon.org\/@funkwhale\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Funkwhale<\/a> <\/p>\n<\/li>\n<li>\n<p>Open Podcast API is on <a href=\"https:\/\/github.com\/OpenPodcastAPI\/api-specs\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GitHub<\/a><\/p>\n<\/li>\n<\/ul>\n<h3>SouthEast LinuxFest<\/h3>\n<ul>\n<li>\n<p><a href=\"https:\/\/southeastlinuxfest.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">SouthEast LinuxFest<\/a> takes place in 9-11 June in Charlotte, North Carolina<\/p>\n<\/li>\n<li>\n<p>Amolith is going to be there, write the <a href=\"https:\/\/linuxlads.com\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">show<\/a> or write <a href=\"https:\/\/secluded.site\/#contact\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">him<\/a> if you want to meet up<\/p>\n<\/li>\n<\/ul>\n<h4>Contact Us<\/h4>\n<ul>\n<li>We have a <a href=\"https:\/\/linuxlads.com\/store\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">store<\/a><\/li>\n<li>And a <a href=\"https:\/\/forum.linuxlads.com\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">forum<\/a><\/li>\n<li>And a <a href=\"http:\/\/steamcommunity.com\/groups\/linuxlads\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Steam Community<\/a><\/li>\n<li>We are on <a href=\"https:\/\/linuxlads.com\/telegram\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Telegram<\/a><\/li>\n<li>And on <a href=\"https:\/\/linuxlads.com\/matrix\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Matrix<\/a><\/li>\n<li>And on <a href=\"https:\/\/linuxlads.com\/discord\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Discord<\/a><\/li>\n<li>And on <a href=\"https:\/\/linuxlads.com\/twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Twitter<\/a><\/li>\n<li>And on <a href=\"https:\/\/linuxlads.com\/mastodon\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Mastodon<\/a><\/li>\n<li>Or email us on show@<\/li>\n<li>And despite rumours to the contrary, we do exist <a href=\"https:\/\/dublinlinux.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">in real life<\/a><\/li>\n<\/ul>\n<h4>Support Us<\/h4>\n<p>Do you enjoy the Linux Lads podcast? Send us some <a href=\"https:\/\/www.linuxlads.com\/support\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">PayPal love ❤<\/a> ️�, or support us on <a href=\"https:\/\/news.open-fab.org\/ko-fi.com\/linuxlads\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Ko-fi<\/a><\/p>\n<h4>Disclaimer<\/h4>\n<p>May contain mature references<\/p>\n<h4>Attribution<\/h4>\n<p>The music for this podcast was sampled from <a href=\"https:\/\/freemusicarchive.org\/music\/Professor_Kliq\/Bust_This_Bust_That\/Bust_This_Bust_That\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bust This Bust That – Professor Kliq<\/a> which was released under the <a href=\"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/3.0\/us\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CC BY NC SA License<\/a>.<\/p>\n","author":"Linux Lads","date":"May 24, 2023","link":"https:\/\/linuxlads.com\/episodes\/103","src":"https:\/\/dts.podtrac.com\/redirect.mp3\/linuxlads.com\/podcast\/audio\/103\/linuxlads_e103.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"3afffc832e1f8f161ec9d27f1d498e57","fset":"","fratio":1},"ppe-3311-21":{"title":"FLOSS Weekly 733: Open Source Science – Tim Bonnemann, Open Source Science","description":"<p>Doc Searls and Dan Lynch talk with Tim Bonneman about how to help open-source science follow the road to success paved by open-source software development and build on lots of interesting and exciting work already going on.<\/p>\n<p><strong>Hosts:<\/strong> <a href=\"https:\/\/twit.tv\/people\/doc-searls\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Doc Searls<\/a> and <a href=\"https:\/\/twit.tv\/people\/dan-lynch\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Dan Lynch<\/a><\/p>\n<p><strong>Guest:<\/strong> <a href=\"https:\/\/opensource.science\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tim Bonnemann<\/a><\/p>\n<p>Download or subscribe to this show at <a href=\"https:\/\/twit.tv\/shows\/floss-weekly\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/twit.tv\/shows\/floss-weekly<\/a><\/p>\n<p>Think your open source project should be on FLOSS Weekly? Email <a href=\"mailto:floss@twit.tv\" rel=\"noopener noreferrer\" target=\"_blank\">floss@twit.tv<\/a>.<\/p>\n<p>Thanks to <a href=\"https:\/\/www.lullabot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Lullabot’s<\/a> Jeff Robbins, web designer and musician, for our theme music.<\/p>\n<p>Get episodes ad-free with Club TWiT at <a href=\"https:\/\/twit.tv\/clubtwit\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/twit.tv\/clubtwit<\/a><\/p>\n<p><strong>Sponsors:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/kolide.com\/floss\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">kolide.com\/floss<\/a><\/li>\n<li><a href=\"http:\/\/bitwarden.com\/twit\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">bitwarden.com\/twit<\/a><\/li>\n<\/ul>\n","author":"TWiT","date":"May 24, 2023","link":"https:\/\/twit.tv\/shows\/floss-weekly\/episodes\/733","src":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/cdn.twit.tv\/audio\/floss\/floss0733\/floss0733.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"66ae2ada5782b24bc48efd6bd6be1e48","fset":"","fratio":1},"ppe-3311-22":{"title":"519: Not So OpenAI","description":"<p>OpenAI’s CEO Sam Altman has gone straight for the open-source kill move.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"https:\/\/linode.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode<\/a>: <a href=\"https:\/\/linode.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Receive a $100 60-day credit towards your new account. <\/a> Promo Code: linode.com\/coder<\/li>\n<li><a href=\"https:\/\/tailscale.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale<\/a>: <a href=\"https:\/\/tailscale.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale is the easiest way to create a peer-to-peer network with the power of Wireguard. <\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/jupitersignal.memberful.com\/checkout?plan=53334\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support Coder Radio<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/news.ycombinator.com\/item?id=36030156\" title=\"Cancelling HP Instant Ink prevents cartridges from being used\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Cancelling HP Instant Ink prevents cartridges from being used<\/a> — It turns out that their terms state that you’re buying the ability to print x pages and the ink is actually always owned by HP, even when in your possession.<\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=fP5YdyjTfG0\" title=\"LIVE: OpenAI CEO Sam Altman testifies during Senate hearing on AI oversight — 05\/16\/23 - YouTube\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">LIVE: OpenAI CEO Sam Altman testifies during Senate hearing on AI oversight — 05\/16\/23 – YouTube<\/a> — The Senate Judiciary Committee holds a hearing examining the rules for artificial intelligence. <\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=WxCTRSCzCrk\" title=\"ChatGPT creator Sam Altman reflects on the Senate's A.I. regulatory hearing - YouTube\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">ChatGPT creator Sam Altman reflects on the Senate’s A.I. regulatory hearing – YouTube<\/a> — ChatGPT creator Sam Altman remarks on the The Senate Judiciary Subcommittee hearing about the “Oversight of A.I.: Rules for Artificial Intelligence.”<\/li>\n<li><a href=\"https:\/\/www.forbes.com\/sites\/craigsmith\/2023\/05\/16\/openais-sam-altman-to-congress-regulate-us-please\/?sh=3966e86e4129\" title=\"OpenAI’s Sam Altman To Congress: Regulate Us, Please!\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenAI’s Sam Altman To Congress: Regulate Us, Please!<\/a><\/li>\n<li><a href=\"https:\/\/www.axios.com\/2023\/05\/17\/ai-leaders-sam-altman-regulate-senate\" title=\"OpenAI's Sam Altman tells senators: regulate us\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenAI’s Sam Altman tells senators: regulate us<\/a><\/li>\n<li><a href=\"https:\/\/www.nytimes.com\/2023\/05\/16\/technology\/openai-altman-artificial-intelligence-regulation.html\" title=\"Sam Altman, ChatGPT Creator and OpenAI CEO, Urges Senate for AI Regulation - The New York Times\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Sam Altman, ChatGPT Creator and OpenAI CEO, Urges Senate for AI Regulation – The New York Times<\/a><\/li>\n<li><a href=\"https:\/\/www.euronews.com\/next\/2023\/05\/17\/openais-sam-altman-calls-for-regulation-amid-fears-ai-could-cause-significant-harm-to-the-\" title=\"OpenAI’s Sam Altman calls for regulation amid fears AI could cause ‘significant harm to the world’ | Euronews\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenAI’s Sam Altman calls for regulation amid fears AI could cause ‘significant harm to the world’ | Euronews<\/a><\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/technology\/2023\/may\/16\/ceo-openai-chatgpt-ai-tech-regulations\" title=\"OpenAI CEO calls for laws to mitigate ‘risks of increasingly powerful’ AI | ChatGPT | The Guardian\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenAI CEO calls for laws to mitigate ‘risks of increasingly powerful’ AI | ChatGPT | The Guardian<\/a><\/li>\n<li><a href=\"https:\/\/apnews.com\/article\/chatgpt-openai-ceo-sam-altman-congress-73ff96c6571f38ad5fd68b3072722790\" title=\"ChatGPT chief says artificial intelligence should be regulated by a US or global agency | AP News\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">ChatGPT chief says artificial intelligence should be regulated by a US or global agency | AP News<\/a><\/li>\n<li><a href=\"https:\/\/www.seattletimes.com\/business\/openais-sam-altman-urges-ai-regulation-in-senate-hearing\/\" title=\"OpenAI’s Sam Altman urges AI regulation in Senate hearing | The Seattle Times\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenAI’s Sam Altman urges AI regulation in Senate hearing | The Seattle Times<\/a><\/li>\n<li><a href=\"https:\/\/www.washingtonpost.com\/technology\/2023\/05\/16\/sam-altman-open-ai-congress-hearing\/\" title=\"OpenAI CEO Sam Altman warns of AI's potential harm, wants regulations - The Washington Post\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenAI CEO Sam Altman warns of AI’s potential harm, wants regulations – The Washington Post<\/a><\/li>\n<li><a href=\"https:\/\/www.wsj.com\/amp\/articles\/chatgpts-sam-altman-faces-senate-panel-examining-artificial-intelligence-4bb6942a\" title=\"ChatGPT’s Sam Altman Warns Congress That AI ‘Can Go Quite Wrong’ - WSJ\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">ChatGPT’s Sam Altman Warns Congress That AI ‘Can Go Quite Wrong’ – WSJ<\/a><\/li>\n<li><a href=\"https:\/\/www.bbc.com\/news\/world-us-canada-65616866\" title=\"Sam Altman: CEO of OpenAI calls for US to regulate artificial intelligence - BBC News\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Sam Altman: CEO of OpenAI calls for US to regulate artificial intelligence – BBC News<\/a><\/li>\n<li><a href=\"https:\/\/fortune.com\/2023\/05\/16\/openai-ceo-sam-altman-congress-regulation-a-i-testimony-eye-on-a-i\/\" title=\"OpenAI CEO Sam Altman tells Congress he wants regulation | Fortune\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenAI CEO Sam Altman tells Congress he wants regulation | Fortune<\/a><\/li>\n<li><a href=\"https:\/\/www.brookings.edu\/blog\/techtank\/2023\/05\/17\/senate-hearing-highlights-ai-harms-and-need-for-tougher-regulation\/\" title=\"Senate hearing highlights AI harms and need for tougher regulation\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Senate hearing highlights AI harms and need for tougher regulation<\/a><\/li>\n<li><a href=\"https:\/\/www.cnn.com\/2023\/05\/16\/tech\/sam-altman-openai-congress\/index.html\" title=\"Mr. ChatGPT goes to Washington: OpenAI CEO Sam Altman testifies before Congress on AI risks | CNN Business\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Mr. ChatGPT goes to Washington: OpenAI CEO Sam Altman testifies before Congress on AI risks | CNN Business<\/a><\/li>\n<li><a href=\"https:\/\/www.reuters.com\/technology\/openai-chief-goes-before-us-congress-propose-licenses-building-ai-2023-05-16\/\" title=\"OpenAI chief concerned about AI being used to compromise elections | Reuters\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenAI chief concerned about AI being used to compromise elections | Reuters<\/a><\/li>\n<li><a href=\"https:\/\/www.informationweek.com\/big-data\/openai-ceo-sam-altman-makes-ai-regulation-plea\" title=\"OpenAI CEO Sam Altman Pleads for AI Regulation\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenAI CEO Sam Altman Pleads for AI Regulation<\/a><\/li>\n<li><a href=\"https:\/\/www.wired.com\/story\/spooked-by-chatgpt-us-lawmakers-want-to-create-an-ai-regulator\/\" title=\"Spooked by ChatGPT, US Lawmakers Want to Create an AI Regulator | WIRED\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Spooked by ChatGPT, US Lawmakers Want to Create an AI Regulator | WIRED<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/MoheganBTC\/status\/1660673161933750277\" title=\"Mohegan ₿TC � on Twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Mohegan ₿TC � on Twitter<\/a> — Today we got the first glimpse of the dangers of AI and social media\n<p>An image was released on twitter stating there was an explosion near the Pentagon �♂️<\/p>\n<p>News spread quickly and over $500 million was sold off from the S&P 500 in minutes <\/p>\n<p>This is just the beginning �<\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2023\/05\/22\/apple-trademark-activity-realityproos-realos\/\" title=\"More Recent Apple Trademark Activity: 'realityproOS'\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">More Recent Apple Trademark Activity: ‘realityproOS’<\/a><\/li>\n<li><a href=\"https:\/\/9to5mac.com\/2023\/05\/22\/reality-pro-launch\/\" title=\"Reality Pro launch and pricing: Making sense of the speculation\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Reality Pro launch and pricing: Making sense of the speculation<\/a> — The consensus view so far has been that Apple will announce the Reality Pro AR\/VR headset at WWDC on June 5, and that pricing will be around $3,000. But some are questioning both …<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 24, 2023","link":"https:\/\/coder.show\/519","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/b44de5fa-47c1-4e94-bf9e-c72f8d1c8f5d\/ab648877-1f21-4559-9b4c-5c563261c09a.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"dcc976e488f639f2aa537d78238582c3","fset":"","fratio":1},"ppe-3311-23":{"title":"412.5 \u2013 Gracias, Amiga!","description":"<p>In our Innards section we talk about Pimiga<\/p>\n<p>In Vibrations from the Ether, Joe interacts with a listener via email about some hardware subjects and other stuff<\/p>\n<h4>In “Check This Out” <\/h4>\n<p><a href=\"https:\/\/www.omglinux.com\/snapshot-new-gnome-camera-app\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>Meet Snapshot, GNOME’s New Camera App<\/strong><\/a><\/p>\n<hr>\n<h3><a href=\"https:\/\/mintcast.org\/show-notes\/episode-412-show-notes\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Full Show Notes Can be Found Here<\/a><\/h3>\n<h3>Wrap-up<\/h3>\n<ul>\n<li><strong>Joe<\/strong> – <a href=\"http:\/\/www.tllts.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Tllts.org<\/u><\/a>, <a href=\"http:\/\/www.linuxlugcast.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>linuxlugcast.com<\/u><\/a>, MeWe, <a href=\"mailto:jb@mintcast.org\" rel=\"noopener noreferrer\" target=\"_blank\"><u>jb@mintcast.org<\/u><\/a>, <a href=\"https:\/\/ko-fi.com\/joeeb\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Buy Joe a coffee<\/u><\/a><\/li>\n<li><a><\/a><strong>Moss <\/strong>– <a href=\"https:\/\/fullcirclemagazine.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Full Circle Weekly News<\/u><\/a>, <a href=\"https:\/\/distrohoppersdigest.blogspot.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Distrohoppers’ Digest<\/u><\/a>, <a href=\"mailto:bardmoss@pm.me\" rel=\"noopener noreferrer\" target=\"_blank\"><u>bardmoss@pm.me<\/u><\/a>, I’m on Mastodon as @zaivala, and other contact information can be found at <a href=\"https:\/\/itsmoss.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">It’s <\/a><a href=\"https:\/\/itsmoss.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Moss dot com<\/a><\/li>\n<li><strong>Bill <\/strong>– <a href=\"mailto:bill@mintcast.org\" rel=\"noopener noreferrer\" target=\"_blank\"><u>bill@mintcast.org<\/u><\/a>, Bill_H on Discord, @wchouser3 on Mastodon, @wchouser3 on Twitter, and wchouser3 on Facebook also – checkout my other podcasts <a href=\"https:\/\/linuxotc.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linux OTC<\/a> and 3 Fat Truckers<\/li>\n<li><strong>Majid<\/strong> – drmajid@mintcast.org @atypicaldoctor on twitter, AtypicalAnaesthetist on instagram and <strong><a href=\"https:\/\/open.spotify.com\/show\/6Uo4DsJE8fJmvo8npljbmx\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The Atypical Anaesthetist Podcast<\/a><\/strong> on Spotify (https:\/\/open.spotify.com\/show\/6Uo4DsJE8fJmvo8npljbmx)<\/li>\n<\/ul>\n<h3>We would like to acknowledge some of the people who make mintCast possible:<\/h3>\n<ul>\n<li><strong>Bill Houser<\/strong> for our audio editing<\/li>\n<li><strong>Archive.org<\/strong> for hosting our audio files<\/li>\n<li><strong>Hobstar<\/strong> for our logo, <strong>initrd<\/strong> for the animated Discord logo<\/li>\n<li><strong>Londoner<\/strong> for our time syncs<\/li>\n<li><strong>Bill Houser<\/strong> for hosting the server which runs our website, website maintenance, and the NextCloud server on which we host our show notes and raw audio<\/li>\n<li><strong>The Linux Mint development team <\/strong>for the fine distro we love to talk about <Thanks, Clem … and co!><\/li>\n<\/ul>\n","author":"mintCast","date":"May 24, 2023","link":"https:\/\/mintcast.org\/412-5-gracias-amiga\/","src":"https:\/\/archive.org\/download\/mintCast412.5\/ep412.5.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"2f8f6076a262a236b5308db2bbbe2e97","fset":"","fratio":1},"ppe-3311-24":{"title":"324: Wayland, The Future Of Linux But When?","description":"<p>FULL SHOW NOTES ►► <a href=\"https:\/\/tuxdigital.com\/podcasts\/destination-linux\/dl-324\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/tuxdigital.com\/podcasts\/destination-linux\/dl-324\/<\/a><\/p>\n","author":"TuxDigital Network","date":"May 23, 2023","link":"https:\/\/destinationlinux.org\/episode-324\/","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/32f28071-0b08-4ea1-afcc-37af75bd83d6\/03d406c3-6046-4458-8687-809210461402.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"ee4824678805cbb2d9573d07ee7ad477","fset":"","fratio":1},"ppe-3311-25":{"title":"Late Night Linux \u2013 Episode 230","description":"<p>Graphing pings in the terminal, streaming playstation games to your Linux machine, finding secrets and sensitive information in your repos, keeping your FOSS Android apps bang up to date, whether programming students should be using Linux, and loads more.<\/p>\n<p> <\/p>\n<p><strong>Discoveries <\/strong><\/p>\n<p><a href=\"https:\/\/github.com\/orf\/gping\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">gping<\/a><\/p>\n<p><a href=\"https:\/\/sr.ht\/~thestr4ng3r\/chiaki\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Chiaki<\/a><\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=n8kbhDTbfwE\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">image stabilised Apollo 15<\/a><\/p>\n<p><a href=\"https:\/\/store.steampowered.com\/app\/953840\/Apollo_11_VR_HD\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Apollo 11 VR HD on Steam<\/a><\/p>\n<p><a href=\"https:\/\/sysprog21.github.io\/lkmpg\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The Linux Kernel Module Programming Guide<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/praetorian-inc\/noseyparker\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nosey Parker<\/a><\/p>\n<p><a href=\"https:\/\/fosstodon.org\/@JoeRess\/110372781463735136\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Joe’s Mastodon thread<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/ImranR98\/Obtainium\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Obtainium<\/a><\/p>\n<p><a href=\"https:\/\/www.gcompris.net\/index-en.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GCompris<\/a><\/p>\n<p> <\/p>\n<p><strong>Feedback<\/strong><\/p>\n<p><a href=\"https:\/\/www.ghacks.net\/2022\/12\/24\/configure-firefox-to-reject-cookie-banners-automatically\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Configure Firefox to reject cookie banners automatically<\/a><\/p>\n<p><a href=\"https:\/\/github.com\/Bavarder\/Bavarder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bavarder: Chit-chat with an AI<\/a><\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p><strong>TrueNAS from iXsystems<\/strong><\/p>\n<p>To learn more about TrueNAS and download it for free, visit <a href=\"http:\/\/truenas.com\/lnl\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>truenas.com\/lnl<\/strong><\/a><\/p>\n<p> <\/p>\n<p><strong>HelloFresh<\/strong><\/p>\n<p>With HelloFresh, you get farm-fresh, pre-portioned ingredients and seasonal recipes delivered right to your doorstep. Get 16 free meals plus free shipping at <a href=\"https:\/\/hellofresh.com\/latenightlinux16\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>hellofresh.com\/latenightlinux16<\/strong><\/a> using the promo code 25admins16.<\/p>\n<p> <\/p>\n<div>\n<div>\n<p><strong>Linode<\/strong><\/p>\n<p>Simplify your cloud infrastructure with Linode’s Linux virtual machines and develop, deploy, and scale your modern applications faster and more easily. Go to <a href=\"https:\/\/linode.com\/latenightlinux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>linode.com\/latenightlinux<\/strong><\/a> and get started with $100 credit.<\/p>\n<\/div>\n<p> <\/p>\n<div>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<div>\n<div>\n<div>\n<div>\n<p>See our <a href=\"https:\/\/latenightlinux.com\/contact\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">contact page<\/a> for ways to get in touch.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/latenightlinux.com\/wp-content\/uploads\/latenightlinux-sm.jpg\"><\/p>\n<p><strong>RSS<\/strong>: Subscribe to the <a href=\"https:\/\/latenightlinux.com\/feeds\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">RSS feeds here<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","author":"Late Night Linux Family All Episodes","date":"May 22, 2023","link":"https:\/\/latenightlinux.com\/late-night-linux-episode-230\/","src":"https:\/\/podtrac.com\/pts\/redirect.mp3\/traffic.libsyn.com\/latenightlinux\/LNL230.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"68328252c933b4eee535430ccd77aaa0","fset":"","fratio":1},"ppe-3311-26":{"title":"511: Accepting the Future","description":"<p>How we found peace with the Linux community’s perpetual debates; and our tricks for finding the signal from the noise.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"http:\/\/tailscale.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale<\/a>: <a href=\"http:\/\/tailscale.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere. Get 20 devices for free for a personal account. <\/a><\/li>\n<li><a href=\"https:\/\/linode.com\/unplugged\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode Cloud Hosting<\/a>: <a href=\"https:\/\/linode.com\/unplugged\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">A special offer for all Linux Unplugged Podcast listeners and new Linode customers, visit linode.com\/unplugged, and receive $100 towards your new account. <\/a><\/li>\n<li><a href=\"https:\/\/bitwarden.com\/linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bitwarden<\/a>: <a href=\"https:\/\/bitwarden.com\/linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bitwarden is the easiest way for businesses and individuals to store, share, and sync sensitive data.<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/jupitersignal.memberful.com\/checkout?plan=52946\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support LINUX Unplugged<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/community.spotify.com\/t5\/Desktop-Linux\/Starting-today-17-may-2023-I-can-t-login-in-the-app-it-says-quot\/td-p\/5582238\" title=\"Spotify App Stops Working for Linux Users\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Spotify App Stops Working for Linux Users<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/GrapheneOS\/status\/1658690148920590336\" title=\"GrapheneOS version 2023051600 Released\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GrapheneOS version 2023051600 Released<\/a> — Add initial Contact Scopes feature as an alternative to granting the Contacts permission… Add production ready Pixel 7a support.<\/li>\n<li><a href=\"https:\/\/discuss.grapheneos.org\/d\/5049-grapheneos-version-2023051600-released\" title=\"GrapheneOS Discussion Forum: Version 2023051600 Released\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GrapheneOS Discussion Forum: Version 2023051600 Released<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/GrapheneOS\/status\/1658692813306093568\" title=\"GrapheneOS on Twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GrapheneOS on Twitter<\/a> — Our new Contact Scopes feature is now available in the Alpha channel. It provides a way to avoid granting the Contacts permission for apps requiring it. It’s similar to our Storage Scopes feature replacing needing any of the media\/storage permissions.<\/li>\n<li><a href=\"https:\/\/twitter.com\/GrapheneOS\/status\/1659996624251133956\" title=\"GrapheneOS on Twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GrapheneOS on Twitter<\/a> — GmsCompatConfig (sandboxed Google Play compatibility layer configuration) version 53 released.<\/li>\n<li><a href=\"https:\/\/www.phoronix.com\/news\/Asahi-Linux-Stop-X.Org\" title=\"Asahi Linux To Users: Please Stop Using X.Org\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Asahi Linux To Users: Please Stop Using X.Org<\/a> — Asahi Linux lead developer Hector Martin issued a lengthy post encouraging users of this Apple Silicon focused Linux distribution to stop using X.Org as Wayland is the future.<\/li>\n<li><a href=\"https:\/\/access.redhat.com\/documentation\/pt-br\/red_hat_enterprise_linux\/9\/html\/9.0_release_notes\/deprecated_functionality\" title=\"RHEL 9: Deprecated functionality\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">RHEL 9: Deprecated functionality<\/a> — The X.org display server is deprecated, and will be removed in a future major RHEL release. The default desktop session is now the Wayland session in most cases.<\/li>\n<li><a href=\"https:\/\/www.reddit.com\/r\/linux\/comments\/13hn54f\/the_whole_x11_vs_wayland_thing\/\" title=\"r\/linux: The whole X11 vs. Wayland thing…\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">r\/linux: The whole X11 vs. Wayland thing…<\/a> — Whilst I get Wayland is the future I have a bunch of issues with it. Off the top of my head…<\/li>\n<li><a href=\"https:\/\/old.reddit.com\/r\/linux\/comments\/13ghhqw\/rustdesk_wontfix_a_naive_privilege_escalation_on\/\" title=\"Rustdesk ‘wontfix’ a naive privilege escalation on Linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Rustdesk ‘wontfix’ a naive privilege escalation on Linux<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/ripxorip\/lup_odroid\" title=\"The LUP Odroid H3+ Chassis\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The LUP Odroid H3+ Chassis<\/a> — I recently got an Odroid H3+ and desperately needed a chassis for it so I decided to make one. Since I am a long-time listener and a big fan of the Linux Unplugged podcast I wanted to pay tribute to it.<\/li>\n<li><a href=\"http:\/\/aprs.fi\/\" title=\"Live APRS Map\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Live APRS Map<\/a><\/li>\n<li><a href=\"https:\/\/podcastguru.io\/\" title=\"Podcast Guru\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podcast Guru<\/a> — The simple & free podcast player for Android & iOS<\/li>\n<li><a href=\"https:\/\/podcastindex.org\/apps?appTypes=app&elements=Value\" title=\"Podcasting 2.0 Apps\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podcasting 2.0 Apps<\/a><\/li>\n<li><a href=\"https:\/\/getalby.com\/\" title=\"Alby\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Alby<\/a><\/li>\n<li><a href=\"https:\/\/podcastindex.org\/podcast\/575694\" title=\"LINUX Unplugged on the Podcastindex.org\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">LINUX Unplugged on the Podcastindex.org<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/NotJoeMartinez\/yt-fts\" title=\"yt-fts: Youtube Full Text Search\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">yt-fts: Youtube Full Text Search<\/a> — Search all of a YouTube channel’s subtitles from the command line<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 22, 2023","link":"https:\/\/linuxunplugged.com\/511","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/f31a453c-fa15-491f-8618-3f71f1d565e5\/684c5ff8-088f-499e-886a-50dc94731934.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"c7ba593fe030c139a22141a18e78bc98","fset":"","fratio":1},"ppe-3311-27":{"title":"Episode 376 – Open Source Summit, who built your open source, and AI","description":"<p dir=\"auto\"><a href=\"https:\/\/mastodon.social\/@joshbressers\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Josh<\/a> and <a href=\"https:\/\/mastodon.social\/@kurtseifried\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kurt<\/a> talk about the Open Source Summit in Vancouver. Josh was there and we pick on two observations. Firstly that security keeps trying to use fear as a feature, except it doesn’t work. Secondly we discuss AI and how people are talking about it. It is changing things, how much is yet to be seen.<\/p>\n<h2 dir=\"auto\">Show Notes<\/h2>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/slsa.dev\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">SLSA<\/a><\/li>\n<li><a href=\"https:\/\/buildsec.github.io\/frsca\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">FRSCA<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/ossf\/s2c2f\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">S2C2F<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/05\/leak-of-msi-uefi-signing-keys-stokes-concerns-of-doomsday-supply-chain-attack\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">MSI leak<\/a><\/li>\n<li><a href=\"https:\/\/www.pcworld.com\/article\/1917169\/mysterious-new-intel-patch-surfaces-for-virtually-all-core-chips.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Intel microcode<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=jPhJbKBuNnA\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tom Scott AI Video<\/a><\/li>\n<\/ul>\n","author":"","date":"May 22, 2023","link":"https:\/\/opensourcesecuritypodcast.libsyn.com\/episode-376-open-source-summit-who-built-your-open-source-and-ai","src":"https:\/\/traffic.libsyn.com\/secure\/opensourcesecuritypodcast\/Episode_376_Open_Source_Summit_who_built_your_open_source_and_AI.mp3?dest-id=542864","featured":"","mediatype":"audio","duration":"00:00","key":"f67fc35ab5a1e6c9efc0871bec128e7a","fset":"","fratio":1},"ppe-3311-28":{"title":"Linux Downtime \u2013 Episode 72","description":"<p>Part 2 of our chat with<a href=\"https:\/\/mollywhite.net\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"> Molly White<\/a> from<a href=\"https:\/\/web3isgoinggreat.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"> Web3 is Going Just Great<\/a>. This time we talk about Mastodon and the Fediverse, central bank digital currencies, cashless societies, the hype around AI, corporate surveillance, and more.<\/p>\n<p><a href=\"https:\/\/linuxdowntime.com\/linux-downtime-episode-71\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Check out part 1 here<\/a><\/p>\n<p><a href=\"https:\/\/hachyderm.io\/@molly0xfff\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Molly’s Mastodon<\/a><\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p><b>ServerMania<\/b><\/p>\n<p>ServerMania offers a wide range of fully customizable dedicated, cloud, colocation, and IP Transit services, and free initial consultations. Go to<a href=\"http:\/\/servermania.com\/ldt\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"> <b>servermania.com\/ldt<\/b><\/a> and use the promo code <b>linuxdowntime<\/b> to get 15% off dedicated servers – recurring for life.<\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p>See our <a href=\"https:\/\/linuxdowntime.com\/contact\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">contact page<\/a> for ways to get in touch.<\/p>\n<p> <\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/linuxdowntime.com\/wp-content\/uploads\/2022\/07\/LDT-300.jpg\" alt=\"\"><\/p>\n<p>Subscribe to the <a href=\"https:\/\/latenightlinux.com\/feed\/extra\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">RSS feed<\/a>.<\/p>\n<p> <\/p>\n","author":"Late Night Linux Family All Episodes","date":"May 21, 2023","link":"https:\/\/latenightlinux.com\/linux-downtime-episode-72\/","src":"https:\/\/podtrac.com\/pts\/redirect.mp3\/traffic.libsyn.com\/latenightlinux\/LDT72.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"dfa126c699b32b73ed347dad95a6457e","fset":"","fratio":1},"ppe-3311-29":{"title":"3\u00d758: Large Langridge Model","description":"<p>Jeremy Garcia, Jono Bacon, and Stuart Langridge present Bad Voltage, in which there is unsceptical intensity, we are all eaten by a T-1000, and we have collected a list of concerns about Large Language Model-based AI, which we’re going to dive into!<\/p>\n<ul>\n<li>[00:00:00] Introduction<\/li>\n<li>[00:04:30] The “free software” concern: it normalises inhaling information for free and then renting out access to it. <a href=\"https:\/\/www.theverge.com\/2023\/4\/28\/23702437\/eu-ai-act-disclose-copyright-training-data-report\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Upcoming EU regulation requires LLM creators to declare copyrighted material used in training corpora<\/a><\/li>\n<li>[00:09:30] The automation one: puts lots of mid-level workers people out of a job, with zero provision for what should happen to those people<\/li>\n<li>[00:25:25] The costlessness one: if it’s free (or at least easy) to generate text (and images and sound and so on), it becomes easy to flood places with it, which leads to finding hotels online being even more difficult, more fake news sites, students submitting LLM-written essays, etc<\/li>\n<li>[00:30:40] The inaccuracy one: LLMs “hallucinate”, meaning that they make up lies and present it with as much confidence as actual information, so it’s very hard to tell the difference, which is problematic when it’s relied upon and can be downright defamatory (as in the case of <a href=\"https:\/\/www.firstpost.com\/world\/chatgpt-makes-up-a-sexual-harassment-scandal-names-real-professor-as-accused-12418552.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Jonathan Turley, law professor, on an LLM-generated list of “lecturers who have sexually harassed their students” which he didn’t<\/a>)<\/li>\n<li>[00:33:35] The magnification of existing bias one: generated text embeds existing biases<\/li>\n<li>[00:53:30] The creativity one: where does the next generation of music and art and writing come from if this generation is written largely by LLMs?<\/li>\n<\/ul>\n<p>Also, we’re now on Mastodon! <a href=\"https:\/\/mastodon.social\/@badvoltage\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">@badvoltage<\/a>!<\/p>\n<p>Come chat with us and the community in our Slack channel via <a href=\"https:\/\/join.slack.com\/t\/badvoltage\/shared_invite\/zt-1porzolgy-eNrK6wREoVIINTbLi_kbsg\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/join.slack.com\/t\/badvoltage\/shared_invite\/zt-1porzolgy-eNrK6wREoVIINTbLi_kbsg<\/a>!<\/p>\n<\/p>\n<p>https:\/\/community.badvoltage.org\/<\/p>\n<p>News music: <a href=\"http:\/\/dig.ccmixter.org\/files\/Robbero\/59218\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Long Live Blind Joe by Robbero<\/a>, used with attribution.<\/p>\n<p>Thank you to Marius Quabeck and <a href=\"https:\/\/nerdzoom.media\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">NerdZoom Media<\/a> for being our audio producers!<\/p>\n","author":"Bad Voltage","date":"May 19, 2023","link":"https:\/\/www.badvoltage.org\/2023\/05\/19\/3x58\/","src":"https:\/\/audio.lugradio.org\/badvoltage\/Bad%20Voltage%203x58.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"2e41121be429419d46723f445a060740","fset":"","fratio":1},"ppe-3311-30":{"title":"97: Tempted by the Fruit of Another","description":"<p>Alex tempts Chris with his Obsidian ways, our thoughts on Drobo going bankrupt, and Photoprism adding paid tiers. Plus, the slick suite of tools you’ll want to run on your LAN.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"https:\/\/linode.com\/ssh\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode<\/a>: <a href=\"https:\/\/linode.com\/ssh\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Receive a $100 60-day credit towards your new account. <\/a> Promo Code: linode.com\/ssh<\/li>\n<li><a href=\"http:\/\/tailscale.com\/selfhosted\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale<\/a>: <a href=\"http:\/\/tailscale.com\/selfhosted\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere. Get 20 devices for free for a personal account. <\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/jupitersignal.memberful.com\/checkout?plan=53744\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support Self-Hosted<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.reddit.com\/r\/ObsidianMD\/comments\/13jhp8c\/garden_planning_with_canvas\/\" title=\"Garden - planning with Canvas\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Garden – planning with Canvas<\/a> — I am using Obsidian to keep track of my gardening stuff. I have notes for all vegetables i am growing, how much i harvested etc…This year i decided to use the canvas feature to help with planning.Overall its a rough sketch of my garden and the beds, thats also why there is a huge empty spot in the middle as there are my garden-house and lawn etc…<\/li>\n<li><a href=\"https:\/\/github.com\/scambier\/obsidian-text-extractor\" title=\"obsidian-text-extractor\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">obsidian-text-extractor<\/a> — Text Extractor is a “companion” plugin. It’s mainly useful when used in conjunction with other plugins (like Omnisearch), but you can also use it to quickly extract texts from images & PDFs.<\/li>\n<li><a href=\"https:\/\/arstechnica.com\/gadgets\/2023\/05\/drobo-reportedly-files-ch-7-bankruptcy-signaling-the-end-of-a-simpler-nas\/\" title=\"Drobo, having stopped sales and support, reportedly files Chapter 7 bankruptcy\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Drobo, having stopped sales and support, reportedly files Chapter 7 bankruptcy<\/a> — Company posted in January that it had “transitioned to a self-service model.”<\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Drobo#:~:text=in%20June%202013%2C%20with%20the,%2Doff%20as%20Drobo%2C%20Inc\" title=\"Drobo - Wikipedia\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Drobo – Wikipedia<\/a><\/li>\n<li><a href=\"https:\/\/www.reddit.com\/r\/homelab\/comments\/130ow24\/45drives_needs_your_help_developing_a_homelab\/\" title=\"45Drives Needs Your Help Developing a Homelab Server\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">45Drives Needs Your Help Developing a Homelab Server<\/a> — 45Drives here to talk about a new project that we are super excited about. We’ve realized it’s time to build a home lab-level storage server.<\/li>\n<li><a href=\"https:\/\/www.photoprism.app\/editions#compare\" title=\"Pricing & Editions – PhotoPrism\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Pricing & Editions – PhotoPrism<\/a> — Simple, affordable pricing. Upgrade or downgrade at any time.<\/li>\n<li><a href=\"https:\/\/github.com\/fastenhealth\/fasten-onprem\" title=\"Fasten\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Fasten<\/a> — Fasten securely connects your healthcare providers together, creating a personal health record that never leaves your hands<\/li>\n<li><a href=\"https:\/\/github.com\/CorentinTh\/it-tools\" title=\"CorentinTh\/it-tools: Collection of handy online tools for developers, with great UX.\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CorentinTh\/it-tools: Collection of handy online tools for developers, with great UX.<\/a> — Useful tools for developers and people working in IT. <\/li>\n<li><a href=\"https:\/\/it-tools.tech\/\" title=\"IT Tools - Demo site\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">IT Tools – Demo site<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=Uzcs97XcxiE\" title=\"Split DNS Magic with Tailscale - YouTube\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Split DNS Magic with Tailscale – YouTube<\/a> — Tailscales Split DNS function within the MagicDNS feature allows us to access devices by name, not IP. But what if we could also access any service running in a remote subnet via a Tailscale subnet router? That’s what we’ll cover in today’s video.<\/li>\n<li><a href=\"https:\/\/matrix.to\/#\/%23garden:jupiterbroadcasting.com\" title=\"Garden Gnomes Chat on Matrix\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Garden Gnomes Chat on Matrix<\/a> — A chat room is for people who are interested in discussing all things gardening, and garden technology. Share your garden pictures, nerds out about about sensors, automated watering, build ideas, and more. We can share our experiences, ask questions, and learn from each other.<\/li>\n<li><a href=\"https:\/\/opensprinkler.com\/product\/opensprinkler\/\" title=\"OpenSprinkler\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenSprinkler<\/a> — OpenSprinkler is an open-source, web-based smart sprinkler controller for lawn and plant watering, drip irrigation, farm irrigation, hydroponics etc. The current version is OS 3.2, with built-in WiFi (based on ESP8266) and OLED display. You can choose between AC-powered, DC-powered, or Latch version. OpenSprinkler supports a variety of solenoid valves (24VAC, Latch, DC, motorized ball valve etc.)<\/li>\n<li><a href=\"https:\/\/getalby.com\/\" title=\"Alby: Your Boostcompanion for the web\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Alby: Your Boostcompanion for the web<\/a> — Alby brings Boosts to the web.<\/li>\n<li><a href=\"https:\/\/podcastindex.org\/podcast\/830124\" title=\"Self-Hosted on the Podcastindex.org\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Self-Hosted on the Podcastindex.org<\/a> — Send a Boost into the show via the web. First, top-up Alby, then head over to our entry on the Podcast Index.<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 19, 2023","link":"https:\/\/selfhosted.show\/97","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/7296e34a-2697-479a-adfb-ad32329dd0b0\/07caca00-0cb7-49ca-80b0-4931bd1a2357.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"f9654e3f926f65dd568918eeb6404874","fset":"","fratio":1},"ppe-3311-31":{"title":"Episode 195","description":"<h2>Overview<\/h2>\n<p>Alex and Camila discuss security update management strategies after a recent<br \/>\noutage at Datadog was attributed to a security update for systemd on Ubuntu,<br \/>\nplus we look at security vulnerabilities in the Linux kernel, OpenStack,<br \/>\nSynapse, OpenJDK and more.<\/p>\n<h2>This week in Ubuntu Security Updates<\/h2>\n<p>66 unique CVEs addressed<\/p>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6069-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6069-1<\/a>] Linux kernel (Raspberry Pi) vulnerability (01:01)<\/h3>\n<ul>\n<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1829\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1829<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>5.4 raspi in 20.04 \/ 18.04 HWE<\/li>\n<li><a href=\"https:\/\/news.open-fab.org\/episode-194\/#usn-6058-1-linux-kernel-vulnerability--05-45\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">[USN-6058-1] Linux kernel vulnerability from Episode 194<\/a><\/li>\n<li>UAF in Traffic-Control Index (TCINDEX) filter from April this year – fix<br \/>\nsimply removes this classifier from the kernel<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6070-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6070-1<\/a>] Linux kernel vulnerabilities (01:37)<\/h3>\n<ul>\n<li>2 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1872\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1872<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1829\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1829<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>5.15 raspi in 22.04, Azure FDE in 20.04<\/li>\n<li>TCINDEX UAF plus UAF in <code>io_uring<\/code><\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6071-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6071-1<\/a>] Linux kernel (OEM) vulnerabilities (01:58)<\/h3>\n<ul>\n<li>12 CVEs addressed in Jammy (22.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-26545\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-26545<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-23455\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-23455<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1859\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1859<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4662\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4662<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4095\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4095<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-40307\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-40307<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3586\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3586<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3303\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3303<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-2590\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-2590<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0386\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0386<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0468\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0468<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1829\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1829<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>5.17<\/li>\n<li>UAFs in TCINDEX, <code>io_uring<\/code>, logic issue in OverlayFS<br \/>\n(<a href=\"https:\/\/news.open-fab.org\/episode-194\/#usn-6057-1-linux-kernel--intel-iotg--vulnerabilities--03-31\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">[USN-6057-1] Linux kernel<br \/>\n(Intel IoTG) vulnerabilities from Episode 194<\/a>), race-condition in handling<br \/>\nof handling of copy-on-write read-only shared memory mappings – unpriv user<br \/>\ncould then get write on these read-only mappings -> privesc<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6072-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6072-1<\/a>] Linux kernel (OEM) vulnerabilities (02:31)<\/h3>\n<ul>\n<li>6 CVEs addressed in Jammy (22.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-26545\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-26545<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-23455\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-23455<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1859\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1859<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0386\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0386<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0468\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0468<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1829\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1829<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>6.0<\/li>\n<li>UAFs in TCINDEX, <code>io_uring<\/code>, logic issue in OverlayFS<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6079-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6079-1<\/a>] Linux kernel vulnerabilities (02:49)<\/h3>\n<ul>\n<li>25 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1118\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1118<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32269\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32269<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-26544\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-26544<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-23455\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-23455<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-23454\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-23454<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21106\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21106<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21102\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21102<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1652\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1652<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1513\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1513<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1078\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1078<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1075\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1075<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1074\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1074<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1073\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1073<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0459\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0459<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0458\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0458<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0394\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0394<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0210\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0210<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-48424\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-48424<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-48423\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-48423<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4842\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4842<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4129\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4129<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3707\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3707<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-36280\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-36280<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-27672\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-27672<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>5.19 22.10 \/ 22.04 Azure<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6080-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6080-1<\/a>] Linux kernel vulnerabilities (02:55)<\/h3>\n<ul>\n<li>10 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1118\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1118<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32269\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32269<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-20938\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-20938<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1513\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1513<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1078\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1078<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1075\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1075<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0459\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0459<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3707\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3707<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-27672\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-27672<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>5.15 22.04 \/ 20.04 HWE<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6081-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6081-1<\/a>] Linux kernel vulnerabilities (03:02)<\/h3>\n<ul>\n<li>5 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1118\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1118<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32269\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32269<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2162\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2162<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1513\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1513<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0459\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0459<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>4.15 18.04 GA \/ 16.04 AWS (Ubuntu Pro)<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6073-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6073-1<\/a>, <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6073-2\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6073-2<\/a>, USN-6073-3, <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6073-4\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6073-4<\/a>] Cinder, Glance Store, Nova, os-brick vulnerability (03:14)<\/h3>\n<ul>\n<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2088\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2088<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Inconsistency between Cinder (block storage service of OpenStack) and Nova<br \/>\n(compute \/ virtual server provisioning) could result in storage volumes being<br \/>\nattached to the wrong compute instances – would happen when trying to detach a<br \/>\nvolume from an instance<\/li>\n<li>Lots of interacting components, all need a consistent view of the system etc<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6073-5\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6073-5<\/a>] Nova regression<\/h3>\n<ul>\n<li>Affecting Focal (20.04 LTS)<\/li>\n<li>Above update meant that in some circumstances Nova would be unable to detach<br \/>\nvolumes from instances<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6074-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6074-1<\/a>] Firefox vulnerabilities (04:15)<\/h3>\n<ul>\n<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32209\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32209<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32208\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32208<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32206\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32206<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32216\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32216<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32215\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32215<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32213\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32213<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32212\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32212<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32211\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32211<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32210\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32210<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32207\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32207<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32205\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32205<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>113.0<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6074-2\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6074-2<\/a>] Firefox regressions (04:27)<\/h3>\n<ul>\n<li>11 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32209\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32209<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32208\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32208<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32206\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32206<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32216\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32216<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32215\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32215<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32213\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32213<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32212\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32212<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32211\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32211<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32210\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32210<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32207\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32207<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32205\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32205<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>113.0.1 from upstream<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6075-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6075-1<\/a>] Thunderbird vulnerabilities (04:36)<\/h3>\n<ul>\n<li>7 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32206\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32206<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32215\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32215<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32213\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32213<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32212\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32212<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32211\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32211<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32207\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32207<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-32205\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-32205<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>102.11.0<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6060-3\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6060-3<\/a>] MySQL regression (05:02)<\/h3>\n<ul>\n<li>Affecting Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)<\/li>\n<li><a href=\"https:\/\/news.open-fab.org\/episode-194\/#usn-6060-1-usn-6060-2-mysql-vulnerabilities--07-40\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">[USN-6060-1, USN-6060-2] MySQL vulnerabilities from Episode 194<\/a><\/li>\n<li>Latest upstream release 8.0.33 introduced a regression on 32-bit ARM (armhf) –<br \/>\nwould crash on startup – to fix, reverted an upstream commit which was<br \/>\nintroduced to help with performance of atomic operations<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6076-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6076-1<\/a>] Synapse vulnerabilities (05:39)<\/h3>\n<ul>\n<li>7 CVEs addressed in Bionic (18.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2018-16515\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2018-16515<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2019-5885\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2019-5885<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2018-12423\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2018-12423<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2019-11842\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2019-11842<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2018-10657\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2018-10657<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2018-12291\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2018-12291<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2019-18835\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2019-18835<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Matrix homeserver<\/li>\n<li>Various issues – signature checking on APIs, failure to properly apply event<br \/>\nvisibility rules, DoS – exploited in the wild, insufficient randomness when<br \/>\ngenerating random IDs made them guessable, ability for unauthorised users to<br \/>\nhijack rooms, more predictable randomness which could allow remote attackers<br \/>\nto impersonate users, event spoofing due to improper signature validation –<br \/>\nsome of these require to be the admin of a room or to have a malicious server<br \/>\netc – but since Matrix is federated, this is not so implausible<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6078-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6078-1<\/a>] libwebp vulnerability (06:38)<\/h3>\n<ul>\n<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1999\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1999<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Double free when handling crafted content<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6077-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6077-1<\/a>] OpenJDK vulnerabilities (06:45)<\/h3>\n<ul>\n<li>7 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21968\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21968<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21967\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21967<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21954\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21954<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21939\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21939<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21938\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21938<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21937\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21937<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21930\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21930<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Latest upstream point releases\n<ul>\n<li>Most Ubuntu releases support more then 1 version of OpenJDK – this update is<br \/>\nfor OpenJDK versions 20, 17, 11 and 8 across the various Ubuntu releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6082-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6082-1<\/a>] EventSource vulnerability (07:02)<\/h3>\n<ul>\n<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-1650\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-1650<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>EventSource client for NodeJS – info leak – could leak cookies and<br \/>\nauthorisation headers to third party applications – but should have been<br \/>\nsanitising headers to avoid this as per same-origin-policy<\/li>\n<\/ul>\n<h2>Goings on in Ubuntu Security Community<\/h2>\n<h3>Datadog outage and management of security updates (07:32)<\/h3>\n<ul>\n<li><a href=\"https:\/\/newsletter.pragmaticengineer.com\/p\/inside-the-datadog-outage\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/newsletter.pragmaticengineer.com\/p\/inside-the-datadog-outage<\/a><\/li>\n<li>Alex and Camila discuss a recent outage at Datadog on their Ubuntu systems<br \/>\nthat was triggered by a security update for systemd and the pros and cons of<br \/>\nautomatic security updates plus other approaches which can be taken to allow<br \/>\nupdates to be applied in a more controlled manner<\/li>\n<li><a href=\"https:\/\/ubuntu.com\/blog\/3-ways-to-apply-security-patches-in-linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/ubuntu.com\/blog\/3-ways-to-apply-security-patches-in-linux<\/a><\/li>\n<\/ul>\n<h2>Get in contact<\/h2>\n<ul>\n<li><a href=\"mailto:security@ubuntu.com\" rel=\"noopener noreferrer\" target=\"_blank\">security@ubuntu.com<\/a><\/li>\n<li><a href=\"https:\/\/libera.chat\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">#ubuntu-security on the Libera.Chat IRC network<\/a><\/li>\n<li><a href=\"https:\/\/lists.ubuntu.com\/mailman\/listinfo\/ubuntu-hardened\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">ubuntu-hardened mailing list<\/a><\/li>\n<li><a href=\"https:\/\/discourse.ubuntu.com\/c\/security\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Security section on discourse.ubuntu.com<\/a><\/li>\n<li><a href=\"https:\/\/fosstodon.org\/@ubuntusecurity\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">@ubuntusecurity<\/a>, <a href=\"https:\/\/twitter.com\/ubuntu_sec\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">@ubuntu_sec on twitter<\/a><\/li>\n<\/ul>\n","author":"Ubuntu Security Team","date":"May 19, 2023","link":"https:\/\/ubuntusecuritypodcast.org\/episode-195\/","src":"https:\/\/people.canonical.com\/~amurray\/USP\/USP_E195.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"13a084ef983c523b01af6c95063c43f3","fset":"","fratio":1},"ppe-3311-32":{"title":"The Homelab Show Ep. 99 \u2013 Linux Safety Net: Why Having a Secondary Distribution is Essential","description":"<figure>\n<div>\n<\/div>\n<\/figure>\n<p><a rel=\"noopener noreferrer\" href=\"https:\/\/thehomelab.show\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/thehomelab.show\/<\/a><br \/>The sponsor for today’s episode<br \/><a rel=\"noopener noreferrer\" href=\"https:\/\/www.linode.com\/homelabshow\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/www.linode.com\/homelabshow<\/a><br \/><a rel=\"noopener noreferrer\" href=\"https:\/\/lawrencesystems.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/lawrencesystems.com\/<\/a><br \/><a rel=\"noopener noreferrer\" href=\"https:\/\/www.learnlinux.tv\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/www.learnlinux.tv\/<\/a><\/p>\n","author":"The Homelab Show","date":"May 18, 2023","link":"https:\/\/thehomelab.show\/2023\/05\/18\/the-homelab-show-ep-99-linux-safety-net-why-having-a-secondary-distribution-is-essential\/","src":"https:\/\/media.blubrry.com\/thehomelabshow\/thehomelab.show\/wp-content\/uploads\/2023\/05\/The-Homelab-show-Episode-99_-Linux-Saftey-Net-second-distribution-essential.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"d97bd35150d68c69ee3edc80cc782d63","fset":"","fratio":1},"ppe-3311-33":{"title":"Linux Action News 293","description":"<p>Bcachefs hits a major milestone, how the Red Hat cuts impact Fedora, Plasma 6 plans, and the software update bricking EV batteries.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"http:\/\/jupiter.party\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Jupiter Network Membership<\/a>: <a href=\"http:\/\/jupiter.party\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support the entire network, and get access to every member’s special feed for every show on the network.<\/a> Promo Code: thesignal<\/li>\n<li><a href=\"http:\/\/linode.com\/lan\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode<\/a>: <a href=\"http:\/\/linode.com\/lan\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Sign up using the link on this page and receive a $100 60-day credit towards your new account. <\/a><\/li>\n<li><a href=\"https:\/\/l.kolide.co\/3klbWzr\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kolide<\/a>: <a href=\"https:\/\/l.kolide.co\/3klbWzr\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kolide can help you nail third-party audits and internal compliance goals with endpoint security for your entire fleet. <\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.jupiter.party\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support Linux Action News<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/lore.kernel.org\/lkml\/20230509165657.1735798-1-kent.overstreet@linux.dev\/T\/#mf171fd06ffa420fe1bcf0f49a2b44a361ca6ac44\" title=\"bcachefs out for review\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">bcachefs out for review<\/a> — I’m submitting the bcachefs filesystem for review and inclusion.<\/li>\n<li><a href=\"https:\/\/bcachefs.org\/TestServerSetup\/\" title=\"bcachefs TestServerSetup\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">bcachefs TestServerSetup<\/a><\/li>\n<li><a href=\"https:\/\/www.phoronix.com\/news\/Bcachefs-For-Review-Linux\" title=\"Bcachefs Submitted For Review - Aims For Mainline\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bcachefs Submitted For Review – Aims For Mainline<\/a><\/li>\n<li><a href=\"https:\/\/funnelfiasco.com\/blog\/2023\/05\/12\/inaction-bcotton\/\" title=\"Fedora Program Manager Laid Off\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Fedora Program Manager Laid Off<\/a> — On 24 April 2023, Red Hat announced a 4% reduction in global staff. As a member of that 4%, today is my last day at Red Hat.<\/li>\n<li><a href=\"https:\/\/www.phoronix.com\/news\/Fedora-PM-Red-Hat-Laid-Off\" title=\"Fedora Program Manager Laid Off As Part Of Red Hat Cuts\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Fedora Program Manager Laid Off As Part Of Red Hat Cuts<\/a><\/li>\n<li><a href=\"https:\/\/pointieststick.com\/2023\/05\/05\/planning-the-future-of-plasma\/\" title=\"KDE Developers Planning For Plasma 6.0\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">KDE Developers Planning For Plasma 6.0<\/a> — This week my fellow developers and I are in Germany for an in-person Plasma sprint–our first since 2019!<\/li>\n<li><a href=\"https:\/\/www.phoronix.com\/news\/KDE-Plasma-6-Sprint-Germany\" title=\"KDE Developers In Germany Planning For Plasma 6.0\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">KDE Developers In Germany Planning For Plasma 6.0<\/a><\/li>\n<li><a href=\"https:\/\/9to5linux.com\/kde-plasma-6-to-ship-with-floating-panel-by-default-double-click-for-opening-files\" title=\"KDE Plasma 6 to Ship with Floating Panel by Default, Double-Click for Opening Files\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">KDE Plasma 6 to Ship with Floating Panel by Default, Double-Click for Opening Files<\/a><\/li>\n<li><a href=\"https:\/\/www.theregister.com\/2023\/05\/16\/tesla_battery_patch_lawsuit\/\" title=\"Tesla sued over battery-busting OTA patch in Model S, X\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tesla sued over battery-busting OTA patch in Model S, X<\/a> — The named plaintiffs claim that, despite Tesla saying their batteries are supposed to last the life of the vehicle, the Musk-owned automaker “deliberately and significantly interfere[d] with the car’s performance through software updates that reduce operating capacity.”<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 18, 2023","link":"https:\/\/linuxactionnews.com\/293","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/dec90738-e640-45e5-b375-4573052f4bf4\/62f33521-7fbf-486a-91fd-120b9b19398b.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"1eb33bb7323173a7f28309b31664ef00","fset":"","fratio":1},"ppe-3311-34":{"title":"507: Michael W. Lucas Interview","description":"<p>Author Michael W. Lucas joins us in this interview to talk about his latest book projects. Find out what he’s up to regarding mail servers, conferences, his views on ChatGPT, and more.<\/p>\n<p><strong><em>NOTES<\/em><\/strong><br \/>\nThis episode of BSDNow is brought to you by <a href=\"https:\/\/www.tarsnap.com\/bsdnow\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tarsnap<\/a> and the <a href=\"https:\/\/www.patreon.com\/bsdnow\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">BSDNow Patreon<\/a><\/p>\n<h2>Interview – Michael W. Lucas – <a href=\"mailto:mwl@mwl.io\" rel=\"noopener noreferrer\" target=\"_blank\">mwl@mwl.io<\/a><\/h2>\n<p>OpenBSD Mastery Filesystems<\/p>\n<h3>Tarsnap<\/h3>\n<ul>\n<li>\n<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.<\/p>\n<\/li>\n<\/ul>\n<h2>– Send questions, comments, show ideas\/topics, or stories you want mentioned on the show to <a href=\"mailto:feedback@bsdnow.tv\" rel=\"noopener noreferrer\" target=\"_blank\">feedback@bsdnow.tv<\/a><\/h2>\n<hr>\n<p>Special Guest: Michael W Lucas.<\/p>\n","author":"Allan Jude","date":"May 18, 2023","link":"https:\/\/www.bsdnow.tv\/507","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/c91b88f1-e824-4815-bcb8-5227818d6010\/188e3b3f-dc07-43ba-aa49-de8223858ead.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"6a1103efb2fdd465e6e59acac0f2534a","fset":"","fratio":1},"ppe-3311-35":{"title":"FLOSS Weekly 732: Update Your Kernels! – Greg Kroah-Hartman, Linux Kernel, Cyber Resilience Act","description":"<p>Doc Searls and Simon Phipps talk with Greg Kroah-Hartman, the veteran top-level Linux kernel maintainer, about the human side of how kernel development works, how AI is still just pattern matching, and how life is about updating everything you can.<\/p>\n<p><strong>Hosts:<\/strong> <a href=\"https:\/\/twit.tv\/people\/doc-searls\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Doc Searls<\/a> and <a href=\"https:\/\/twit.tv\/people\/simon-phipps\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Simon Phipps<\/a><\/p>\n<p><strong>Guest:<\/strong> <a href=\"https:\/\/twitter.com\/gregkh\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Greg Kroah-Hartman<\/a><\/p>\n<p>Download or subscribe to this show at <a href=\"https:\/\/twit.tv\/shows\/floss-weekly\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/twit.tv\/shows\/floss-weekly<\/a><\/p>\n<p>Think your open source project should be on FLOSS Weekly? Email <a href=\"mailto:floss@twit.tv\" rel=\"noopener noreferrer\" target=\"_blank\">floss@twit.tv<\/a>.<\/p>\n<p>Thanks to <a href=\"https:\/\/www.lullabot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Lullabot’s<\/a> Jeff Robbins, web designer and musician, for our theme music.<\/p>\n<p>Get episodes ad-free with Club TWiT at <a href=\"https:\/\/twit.tv\/clubtwit\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/twit.tv\/clubtwit<\/a><\/p>\n<p><strong>Sponsor:<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/fastmail.com\/twit\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">fastmail.com\/twit<\/a><\/li>\n<\/ul>\n","author":"TWiT","date":"May 17, 2023","link":"https:\/\/twit.tv\/shows\/floss-weekly\/episodes\/732","src":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/cdn.twit.tv\/audio\/floss\/floss0732\/floss0732.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"1b7a3aa210c2121f1b525c0fb0ac107e","fset":"","fratio":1},"ppe-3311-36":{"title":"518: Driving Mr. Dominick","description":"<p>We laugh at Google’s scramble, check in on the Twitter collapse, and how one developer’s little mistake screwed millions.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"https:\/\/linode.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode<\/a>: <a href=\"https:\/\/linode.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Receive a $100 60-day credit towards your new account. <\/a> Promo Code: linode.com\/coder<\/li>\n<li><a href=\"https:\/\/tailscale.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale<\/a>: <a href=\"https:\/\/tailscale.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale is the easiest way to create a peer-to-peer network with the power of Wireguard. <\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/jupitersignal.memberful.com\/checkout?plan=53334\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support Coder Radio<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/twitter.com\/michaelguimarin\/status\/1657142304531173376?s=12&t=E9EIlRX-vHxbQ8g23lQU3A\" title=\"Michael Guimarin on Twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Michael Guimarin on Twitter<\/a> — About a month from now Apple is going to announce support for using its silicon neural engine to run commercial and open source LLMs on the iPhone, etc.\n<p>This will enable the work @BrianRoemmele<br \/>\n is currently popularizing to come to Apple’s entire ecosystem.<\/p>\n<p>Strap in.<\/p>\n<p>���<\/li>\n<li><a href=\"https:\/\/twitter.com\/markgurman\/status\/1657752373270556673\" title=\"Mark Gurman on Twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Mark Gurman on Twitter<\/a> — Power On: As Apple prepares to launch its next M2 Macs, the company is already ramping up testing of M3 chips. Here are the details and code counts of the next-generation 3 nanometer processors<\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2023\/05\/15\/apple-tsmc-3nm-production-capacity\/\" title=\"Apple Books Nearly 90% of TSMC's 3nm Production Capacity for This Year\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Apple Books Nearly 90% of TSMC’s 3nm Production Capacity for This Year<\/a> — Apple has booked nearly 90% of chip supplier TSMC’s first-generation 3-nanometer process capacity this year for future iPhones, Macs, and iPads, according to industry sources cited by DigiTimes, providing the Taiwanese foundry with significant growth momentum in the second half of 2023.<\/li>\n<li><a href=\"https:\/\/www.cnbc.com\/2023\/05\/11\/elon-musk-says-hes-stepping-down-as-twitter-ceo-will-oversee-product.html\" title=\"Elon Musk stepping down as Twitter CEO\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Elon Musk stepping down as Twitter CEO<\/a> — Linda Yaccarino, NBCUniversal’s advertising chief, is in advanced talks for the role, CNBC’s Julia Boorstin reported.<\/li>\n<li><a href=\"https:\/\/www.wired.com\/story\/the-curious-case-of-the-missing-google-assistant\/\" title=\"The Curious Case of the Missing Google Assistant\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The Curious Case of the Missing Google Assistant<\/a> — Google’s generative AI chatbot Bard took center stage at the company’s I\/O conference. The company’s answer to Siri was left backstage.<\/li>\n<li><a href=\"https:\/\/stratechery.com\/2023\/google-i-o-and-the-coming-ai-battles\/\" title=\"Google I\/O and the Coming AI Battles\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Google I\/O and the Coming AI Battles<\/a><\/li>\n<li><a href=\"https:\/\/www.reuters.com\/business\/autos-transportation\/toyota-flags-possible-leak-more-than-2-mln-users-vehicle-data-japan-2023-05-12\/\" title=\"More than 2 million Toyota users face risk of vehicle data leak in Japan\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">More than 2 million Toyota users face risk of vehicle data leak in Japan<\/a> — The vehicle data of 2.15 million users in Japan, or almost the entire customer base who signed up for its main cloud service platforms since 2012, had been publicly available for a decade due to human error.<\/li>\n<li><a href=\"https:\/\/getalby.com\/\" title=\"Alby: Your Boost companion for the web\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Alby: Your Boost companion for the web<\/a> — Alby brings Boosts to the web.<\/li>\n<li><a href=\"https:\/\/podcastindex.org\/podcast\/487548\" title=\"Coder Radio on the Podcastindex.org\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Coder Radio on the Podcastindex.org<\/a> — Send a Boost into the show via the web. First, top-up Alby, then head over to our entry on the Podcast Index.<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 17, 2023","link":"https:\/\/coder.show\/518","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/b44de5fa-47c1-4e94-bf9e-c72f8d1c8f5d\/bd667c8f-4a53-4edd-9991-844edbe94ade.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"8aebb127bf60a8bbaf631e2aead06182","fset":"","fratio":1},"ppe-3311-37":{"title":"412 \u2013 Coldpause","description":"<p>First up, in the news, Mint News for April, Mozilla Thunderbird is adding paid features and services, Raspberry Pi OS updates, sudo and su get Rusty, Flatseal gets GTK4, new Framework laptop gets Ryzen 7040 series, Kingston firmware contains lyrics, YouTube tests blocking adblock, Star5’s Vision 2 RISC-V gets Ubuntu, and Microsoft wants Firefox to switch to Bing<\/p>\n<p>In security and privacy, India bans open-source messaging apps “for security reasons”;<\/p>\n<p>Then in our Wanderings, Bill tells a story, Joe gets political, I conquered wifi, and Majid goes back in time.<\/p>\n<hr>\n<h2>The News<\/h2>\n<p><a href=\"https:\/\/blog.linuxmint.com\/?p=4513\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>Mint News for April<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.howtogeek.com\/891204\/mozilla-thunderbird-is-adding-paid-features-and-services\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>Mozilla Thunderbird Is Adding Paid Features and Services<\/strong><\/a><\/p>\n<p><strong><a href=\"https:\/\/9to5linux.com\/latest-raspberry-pi-os-release-brings-linux-kernel-6-1-lts-chromium-113-and-more\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Raspberry Pi OS updates with new kernel, chromium<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.phoronix.com\/news\/sudo-su-rewrite-rust\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Sudo and su are being rewritten in Rust for better security<\/a> <\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.omglinux.com\/flatseal-2-0-released-with-gtk4-libadwaita-ui\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Flatseal 2.0 released with GTK4, libadwaita<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/frame.work\/blog\/announcing-the-framework-laptop-13-powered-by-amd-ryzen\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Framework Laptop gets Ryzen 7040 Series<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/technology\/surprise-coldplay-lyrics-hidden-in-kingston-ssd-firmware\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Coldplay Lyrics Hidden in Kingston SSD Firmware<\/a><\/strong><\/p>\n<p><strong><a rel=\"noopener noreferrer\" href=\"https:\/\/9to5google.com\/2023\/05\/10\/youtube-ad-blockers\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">YouTube Is Testing Blocking AdBlockers<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/ubuntu.com\/\/blog\/canonical-enables-ubuntu-on-starfive-visionfive2-risc-v-board\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Star5’s Vision 2 RISC-V Gets Ubuntu<\/a><\/strong><\/p>\n<p><strong><a rel=\"noopener noreferrer\" href=\"https:\/\/www.omgubuntu.co.uk\/2023\/05\/microsoft-wants-firefox-to-ditch-google-switch-to-bing\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Microsoft wants Firefox to ditch Google, switch to Bing<\/a><\/strong><\/p>\n<hr>\n<h2>Security and Privacy<\/h2>\n<p><strong><a rel=\"noopener noreferrer\" href=\"https:\/\/www.theregister.com\/2023\/05\/09\/india_messaging_apps_ban\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">India bans open source messaging apps for security reasons. FOSS community says good luck<\/a><\/strong><\/p>\n<hr>\n<h2><a href=\"http:\/\/192.168.1.167:8181\/show-notes\/episode-412-show-notes\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Full Show Notes Can Be Found Here<\/a><\/h2>\n<h2>Wrap Up<\/h2>\n<ul>\n<li><strong>Joe<\/strong> – <a href=\"http:\/\/www.tllts.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Tllts.org<\/u><\/a>, <a href=\"http:\/\/www.linuxlugcast.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>linuxlugcast.com<\/u><\/a>, MeWe, <a href=\"mailto:jb@mintcast.org\" rel=\"noopener noreferrer\" target=\"_blank\"><u>jb@mintcast.org<\/u><\/a>, <a href=\"https:\/\/ko-fi.com\/joeeb\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Buy Joe a coffee<\/u><\/a><\/li>\n<li><strong>Moss <\/strong>– <a href=\"https:\/\/fullcirclemagazine.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Full Circle Weekly News<\/u><\/a>, <a href=\"https:\/\/distrohoppersdigest.blogspot.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Distrohoppers’ Digest<\/u><\/a>, <a href=\"mailto:bardmoss@pm.me\" rel=\"noopener noreferrer\" target=\"_blank\"><u>bardmoss@pm.me<\/u><\/a>, I’m on Mastodon as @zaivala, and other contact information can be found at <a href=\"https:\/\/itsmoss.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">It’s <\/a><a href=\"https:\/\/itsmoss.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Moss dot com<\/a><\/li>\n<li><strong>Bill <\/strong>– <a href=\"mailto:bill@mintcast.org\" rel=\"noopener noreferrer\" target=\"_blank\"><u>bill@mintcast.org<\/u><\/a>, Bill_H on Discord, @wchouser3 on Mastodon, @wchouser3 on Twitter, and wchouser3 on Facebook also – checkout my other podcasts <a href=\"https:\/\/linuxotc.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linux OTC<\/a> and 3 Fat Truckers<\/li>\n<li><strong>Majid<\/strong> – drmajid@mintcast.org @atypicaldoctor on twitter, AtypicalAnaesthetist on instagram and The Atypical Anaesthetist Podcast on Spotify (https:\/\/open.spotify.com\/show\/6Uo4DsJE8fJmvo8npljbmx)<\/li>\n<\/ul>\n<h3>We would like to acknowledge some of the people who make mintCast possible:<\/h3>\n<ul>\n<li><strong>Bill Houser<\/strong> for our audio editing<\/li>\n<li><strong>Archive.org<\/strong> for hosting our audio files<\/li>\n<li><strong>Hobstar<\/strong> for our logo, <strong>initrd<\/strong> for the animated Discord logo<\/li>\n<li><strong>Londoner<\/strong> for our time syncs<\/li>\n<li><strong>Bill Houser<\/strong> for hosting the server which runs our website, website maintenance, and the NextCloud server on which we host our show notes and raw audio<\/li>\n<li><strong>The Linux Mint development team <\/strong>for the fine distro we love to talk about <Thanks, Clem … and co!><\/li>\n<\/ul>\n","author":"mintCast","date":"May 17, 2023","link":"https:\/\/mintcast.org\/412-coldpause\/","src":"https:\/\/archive.org\/download\/mintCast412\/ep412.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"b3a13ac51495b340f845ac843d2b54f9","fset":"","fratio":1},"ppe-3311-38":{"title":"323: Reviewing The Most Popular Linux Distro In The World","description":"<p>FULL SHOW NOTES ►► <a href=\"https:\/\/tuxdigital.com\/podcasts\/destination-linux\/dl-323\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/tuxdigital.com\/podcasts\/destination-linux\/dl-323\/<\/a><\/p>\n","author":"TuxDigital Network","date":"May 17, 2023","link":"https:\/\/destinationlinux.org\/episode-323\/","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/32f28071-0b08-4ea1-afcc-37af75bd83d6\/0b049fa3-1b4a-429f-9b4e-1e300e2496de.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"edc88c3c53afd82b541303a084fc2cd3","fset":"","fratio":1},"ppe-3311-39":{"title":"Linux Matters 3: Soaking up the Cider","description":"<p dir=\"auto\">In this episode we discuss:<\/p>\n<ul dir=\"auto\">\n<li>Switching to <a href=\"https:\/\/cider.sh\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Apple Music on Desktop Linux<\/a><\/li>\n<li><a href=\"https:\/\/gitlab.steamos.cloud\/devkit\/steamos-devkit\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Sideloading Homebrew on Steam Deck<\/a><\/li>\n<li>Finding <a href=\"https:\/\/joplinapp.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">note-taking nirvana<\/a><\/li>\n<\/ul>\n<p> <\/p>\n<p>You can send your feedback via show@linuxmatters.sh or the<a href=\"https:\/\/linuxmatters.sh\/contact\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"> <b>Contact Form<\/b><\/a>. If you’d like to hang out with other listeners and share your feedback with the community you can join:<\/p>\n<ul>\n<li>The<a href=\"https:\/\/linuxmatters.sh\/telegram\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"> <b>Linux Matters Chatters<\/b><\/a> on Telegram.<\/li>\n<li>The<a href=\"https:\/\/discord.com\/invite\/wgQsshhrWW\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"> #linux-matters<\/a> channel on the<a href=\"https:\/\/discord.com\/invite\/wgQsshhrWW\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"> <b>Late Night Linux Discord<\/b><\/a> server.<\/li>\n<\/ul>\n<p> <\/p>\n<p>If you enjoy the show, please<a href=\"https:\/\/linuxmatters.sh\/support\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"> <b>consider supporting us using Patreon or PayPal<\/b><\/a>. For $5 a month on Patreon, you can enjoy an ad-free feed of Linux Matters, or for $10, get access to all the<a href=\"https:\/\/latenightlinux.com\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"> Late Night Linux<\/a> family of podcasts ad-free.<\/p>\n<p> <\/p>\n<p><strong>Web Developer job<\/strong><\/p>\n<p>See<a href=\"https:\/\/linuxmatters.sh\/catalyst\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"> linuxmatters.sh\/catalyst<\/a> for details.<\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/latenightlinux.com\/wp-content\/uploads\/2023\/04\/linuxmatters-300x300.jpeg\" alt=\"\"><\/p>\n<p><strong>RSS<\/strong>: Subscribe to the <a href=\"https:\/\/latenightlinux.com\/feeds\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">RSS feeds here<\/a><\/p>\n<p> <\/p>\n","author":"Late Night Linux Family All Episodes","date":"May 16, 2023","link":"https:\/\/latenightlinux.com\/linux-matters-3-soaking-up-the-cider\/","src":"https:\/\/traffic.libsyn.com\/latenightlinux\/LMP3.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"0411fd928a0b7b044a6adfd66d2351b0","fset":"","fratio":1},"ppe-3311-40":{"title":"Late Night Linux \u2013 Episode 229","description":"<p>Thunderbird shows that asking users for money works, Red Hat’s priorities seem to be moving away from the community, Mozilla is set to show the Fediverse how it’s done, Mastodon simplifies its onboarding experience, Linux is better than Windows on handhelds, Roblox stops working for us, a peek at the upcoming Plasma 6 release, and more.<\/p>\n<p> <\/p>\n<p><strong>News<\/strong><\/p>\n<p><a href=\"https:\/\/blog.thunderbird.net\/2023\/05\/thunderbird-is-thriving-our-2022-financial-report\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Thunderbird Is Thriving: Our 2022 Financial Report<\/a><\/p>\n<p><a href=\"https:\/\/funnelfiasco.com\/blog\/2023\/05\/12\/inaction-bcotton\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Fedora Program Manager layed off<\/a><\/p>\n<p>(<a href=\"https:\/\/docs.fedoraproject.org\/en-US\/council\/fpgm\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">what that role was<\/a>)<\/p>\n<p><a href=\"https:\/\/www.theverge.com\/23710406\/mozilla-social-mastodon-fediverse-moderation\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Mozilla’s new Mozilla.Social Mastodon instance is an attempt to reinvent content moderation<\/a><\/p>\n<p><a href=\"https:\/\/blog.joinmastodon.org\/2023\/05\/a-new-onboarding-experience-on-mastodon\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">A new onboarding experience on Mastodon<\/a><\/p>\n<p><a href=\"https:\/\/www.gamingonlinux.com\/2023\/05\/goodbye-to-roblox-on-linux-with-their-new-anti-cheat-and-wine-blocking\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Goodbye to Roblox on Linux with their new anti-cheat and Wine blocking<\/a><\/p>\n<p><a href=\"https:\/\/www.theverge.com\/23719210\/asus-rog-ally-review\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Asus ROG Ally review: it’s time to stop pretending Windows is the answer<\/a><\/p>\n<p><a href=\"https:\/\/arstechnica.com\/gaming\/2023\/05\/nintendo-files-dmca-takedowns-on-switch-emulation-tools-just-before-tears-debut\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nintendo, ticked by Zelda leaks, does a DMCA run on Switch emulation tools<\/a><\/p>\n<p><a href=\"https:\/\/pointieststick.com\/2023\/05\/11\/plasma-6-better-defaults\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Plasma 6: “Better defaults”<\/a><\/p>\n<p><a href=\"https:\/\/www.volkerkrause.eu\/2023\/05\/13\/plasma-6-sprint-augsburg-2023.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Plasma 6 Sprint 2023<\/a><\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p><strong>Kolide<\/strong><\/p>\n<p>Kolide believes that maintaining endpoint security shouldn’t mean compromising employee privacy. Learn more here at <a href=\"https:\/\/kolide.com\/latenightlinux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>kolide.com\/latenightlinux<\/strong><\/a><\/p>\n<p> <\/p>\n<p><strong>Tailscale<\/strong><\/p>\n<p>Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly. Go to <strong><a href=\"https:\/\/tailscale.com\/?utm_source=latenightlinux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">tailscale.com<\/a> <\/strong>and try it for free on up to 100 devices.<\/p>\n<p> <\/p>\n<div>\n<div>\n<p><strong>Linode<\/strong><\/p>\n<p>Simplify your cloud infrastructure with Linode’s Linux virtual machines and develop, deploy, and scale your modern applications faster and more easily. Go to <a href=\"https:\/\/linode.com\/latenightlinux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>linode.com\/latenightlinux<\/strong><\/a> and get started with $100 credit.<\/p>\n<\/div>\n<p> <\/p>\n<div>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<div>\n<div>\n<div>\n<div>\n<p>See our <a href=\"https:\/\/latenightlinux.com\/contact\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">contact page<\/a> for ways to get in touch.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/latenightlinux.com\/wp-content\/uploads\/latenightlinux-sm.jpg\"><\/p>\n<p><strong>RSS<\/strong>: Subscribe to the <a href=\"https:\/\/latenightlinux.com\/feeds\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">RSS feeds here<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","author":"Late Night Linux Family All Episodes","date":"May 16, 2023","link":"https:\/\/latenightlinux.com\/late-night-linux-episode-229\/","src":"https:\/\/podtrac.com\/pts\/redirect.mp3\/traffic.libsyn.com\/latenightlinux\/LNL229.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"ef007eada24a1bf2741cfa2381b08b71","fset":"","fratio":1},"ppe-3311-41":{"title":"Episode 375 – The market forces of left-pad, Episode 77 remaster part 2","description":"<p dir=\"auto\"><a href=\"https:\/\/mastodon.social\/@joshbressers\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Josh<\/a> and <a href=\"https:\/\/mastodon.social\/@kurtseifried\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kurt<\/a> finish up the leftpad discussion. We spent a lot of time talking about how the market will respond to these sort of events, and the market did indeed speak; very little has changed. There is an aspect of all these security events where we need to understand the cost vs benefit just isn’t there. it may never be there. Rather than whine and complain, we need to work with our constraints.<\/p>\n<h2 dir=\"auto\">Show Notes<\/h2>\n<ul dir=\"auto\">\n<li><a href=\"https:\/\/opensourcesecurity.io\/2018\/01\/11\/episode-77-npm-and-the-supply-chain\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Episode 77 – npm and the supply chain<\/a><\/li>\n<\/ul>\n","author":"","date":"May 15, 2023","link":"https:\/\/opensourcesecuritypodcast.libsyn.com\/episode-375-the-market-forces-of-left-pad-episode-77-remaster-part-2","src":"https:\/\/traffic.libsyn.com\/secure\/opensourcesecuritypodcast\/Episode_375_The_market_forces_of_left-pad_Episode_77_remaster_part_2.mp3?dest-id=542864","featured":"","mediatype":"audio","duration":"00:00","key":"37d1e3603526d9eebfdc54d6e21125b3","fset":"","fratio":1},"ppe-3311-42":{"title":"510: Thinking in Decades","description":"<p>The push for free software takes years, maybe even generations. Brent gets the inside story from the Free Software Foundation Europe.<\/p>\n<p>Special Guest: Matthias Kirschner.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"http:\/\/tailscale.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale<\/a>: <a href=\"http:\/\/tailscale.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere. Get 20 devices for free for a personal account. <\/a><\/li>\n<li><a href=\"https:\/\/linode.com\/unplugged\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode Cloud Hosting<\/a>: <a href=\"https:\/\/linode.com\/unplugged\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">A special offer for all Linux Unplugged Podcast listeners and new Linode customers, visit linode.com\/unplugged, and receive $100 towards your new account. <\/a><\/li>\n<li><a href=\"https:\/\/bitwarden.com\/linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bitwarden<\/a>: <a href=\"https:\/\/bitwarden.com\/linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bitwarden is the easiest way for businesses and individuals to store, share, and sync sensitive data.<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/jupitersignal.memberful.com\/checkout?plan=52946\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support LINUX Unplugged<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/twitter.com\/SteamDeckHQ\/status\/1656693519778738177\" title=\"SteamDeckHQ on Twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">SteamDeckHQ on Twitter<\/a> — What is your opinion on the ROG ALLY? Is it something you’ll be getting after seeing the stream and reading the reviews? We are on the fence here. Love the idea of extra power, but the worse battery life, using windows, glitches, and lack of touchpads does hamper our excitement.<\/li>\n<li><a href=\"https:\/\/rog.asus.com\/gaming-handhelds\/rog-ally\/rog-ally-2023\/\" title=\"ROG Ally (2023)\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">ROG Ally (2023)<\/a> — The ROG Ally is a true Windows 11 gaming machine, and comes bundled with 3 months of Xbox Game Pass Ultimate for free.<\/li>\n<li><a href=\"https:\/\/fsfe.org\/\" title=\"FSFE - Free Software Foundation Europe\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">FSFE – Free Software Foundation Europe<\/a> — Free Software Foundation Europe is a charity that empowers users to control technology.<\/li>\n<li><a href=\"https:\/\/fsfe.org\/about\/people\/kirschner\/kirschner.en.html\" title=\"Matthias Kirschner - FSFE\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Matthias Kirschner – FSFE<\/a><\/li>\n<li><a href=\"https:\/\/fsfe.org\/news\/2023\/news-20230511-01.en.html\" title=\"EU Parliament wants to protect Free Software in AI regulation\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">EU Parliament wants to protect Free Software in AI regulation<\/a> — Today the European Parliament’s responsible committees voted by a large majority to protect Free Software in the AI regulation.<\/li>\n<li><a href=\"https:\/\/fsfe.org\/activities\/ms-vs-eu\/ms-vs-eu.en.html\" title=\"FSFE and the antitrust case against Microsoft\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">FSFE and the antitrust case against Microsoft<\/a><\/li>\n<li><a href=\"https:\/\/fsfe.org\/activities\/publiccode\/publiccode.en.html\" title=\"Public Money? Public Code! - FSFE\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Public Money? Public Code! – FSFE<\/a> — Why is software created using taxpayers’ money not released as Free Software? We want legislation requiring that publicly financed software developed for the public sector be made publicly available under a Free and Open Source Software licence.<\/li>\n<li><a href=\"https:\/\/fsfe.org\/activities\/activities.en.html\" title=\"Activities - FSFE\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Activities – FSFE<\/a> — As a non-profit, non-governmental organisation, Free Software Foundation Europe works to create general understanding and support for Free Software and Open Standards.<\/li>\n<li><a href=\"https:\/\/fsfe.org\/contribute\/\" title=\"Contribute - FSFE\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Contribute – FSFE<\/a> — We are a diverse community of people from all over Europe and beyond, who are committed to Free Software. If you feel likewise, join us in our work for freedom.<\/li>\n<li><a href=\"https:\/\/fsfe.org\/activities\/childrensbook\/index.en.html\" title=\"Ada & Zangemann\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Ada & Zangemann<\/a> — This illustrated book tells the story of the famous inventor Zangemann and the girl Ada, a curious tinkerer. Ada begins to experiment with hardware and software, and in the process realises how crucial it is for her and others to control technology.<\/li>\n<li><a href=\"https:\/\/twitter.com\/fountain_app\/status\/1657139753555222528\" title=\"Fountain on Twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Fountain on Twitter<\/a> — BALLER BOOSTS ARE BACK We have partnered with @bitrefill to give away a $50 Bitrefill Balance Card to two super-fans on Fountain every week. All you have to do is BOOST<\/li>\n<li><a href=\"http:\/\/www.gardenbot.org\/howTo\/\" title=\"GardenBot\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GardenBot<\/a> — GardenBot is an open source garden monitoring system. This site is a collection of tutorials for how to build things (like a soil moisture sensor), software for running GardenBot, resources, links, and more.<\/li>\n<li><a href=\"https:\/\/podcastindex.org\/apps?appTypes=app&elements=Value\" title=\"Podcasting 2.0 Apps\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podcasting 2.0 Apps<\/a><\/li>\n<li><a href=\"https:\/\/getalby.com\/\" title=\"Alby\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Alby<\/a><\/li>\n<li><a href=\"https:\/\/podcastindex.org\/podcast\/575694\" title=\"LINUX Unplugged on the Podcastindex.org\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">LINUX Unplugged on the Podcastindex.org<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/polkaulfield\/ubuntu-debullshit\" title=\"ubuntu-debullshit\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">ubuntu-debullshit<\/a> — TL;DR, you will end up with a clean GNOME desktop with flatpaks, similar to a fresh Fedora install.<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 14, 2023","link":"https:\/\/linuxunplugged.com\/510","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/f31a453c-fa15-491f-8618-3f71f1d565e5\/89d0b705-ebd5-46d2-bba4-70a71e0feec3.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"3f7a9f1ea4afcb22d94d8965a678b4b6","fset":"","fratio":1},"ppe-3311-43":{"title":"Linux After Dark \u2013 Episode 43","description":"<p>The times we’ve spent far too long troubleshooting simple problems – from permissions issues to unplugged cables and CDs in the wrong slots. Plus Dalton realises that he’s a happy Btrfs user.<\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p><b>ServerMania<\/b><\/p>\n<p>ServerMania offers a wide range of fully customizable dedicated, cloud, colocation, and IP Transit services, and free initial consultations. Go to <a href=\"http:\/\/servermania.com\/lad\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><b>servermania.com\/lad<\/b><\/a> and use the promo code <b>linuxafterdark<\/b> to get 15% off dedicated servers – recurring for life.<\/p>\n<p> <\/p>\n<p><strong>Tailscale<\/strong><\/p>\n<p>Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly. Go to <strong><a href=\"https:\/\/tailscale.com\/?utm_source=linuxafterdark\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">tailscale.com<\/a> <\/strong>and try it for free on up to 100 devices.<\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p>See our <a href=\"https:\/\/linuxafterdark.net\/contact\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">contact page<\/a> for ways to get in touch.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/linuxafterdark.net\/wp-content\/uploads\/2022\/07\/LAD-300-300x300.jpg\" alt=\"\"><\/p>\n<p>Subscribe to the <a href=\"https:\/\/linuxafterdark.net\/feed\/podcast\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">RSS feed<\/a>.<\/p>\n","author":"Late Night Linux Family All Episodes","date":"May 12, 2023","link":"https:\/\/latenightlinux.com\/linux-after-dark-episode-43\/","src":"https:\/\/podtrac.com\/pts\/redirect.mp3\/traffic.libsyn.com\/latenightlinux\/LAD43.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"d09446d53c6b540b7d9f5eb761d801de","fset":"","fratio":1},"ppe-3311-44":{"title":"Linux Action News 292","description":"<p>We get you up to speed on two serious flaws, Linux’s recent gaming loss, Ubuntu doubling down on RISC-V, and news from the Open Source Summit North America.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"https:\/\/l.kolide.co\/3klbWzr\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kolide<\/a>: <a href=\"https:\/\/l.kolide.co\/3klbWzr\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kolide can help you nail third-party audits and internal compliance goals with endpoint security for your entire fleet. <\/a><\/li>\n<li><a href=\"http:\/\/linode.com\/lan\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode<\/a>: <a href=\"http:\/\/linode.com\/lan\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Sign up using the link on this page and receive a $100 60-day credit towards your new account. <\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.jupiter.party\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support Linux Action News<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=%20CVE-2023-28410\" title=\"CVE - CVE-2023-28410\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE – CVE-2023-28410<\/a> — Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access. <\/li>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00886.html\" title=\"INTEL-SA-00886\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">INTEL-SA-00886<\/a><\/li>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/default.html\" title=\"Intel Security Center\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Intel Security Center<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-linux-kernel-netfilter-flaw-gives-attackers-root-privileges\/\" title=\"New NetFilter flaw gives attackers root privileges\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">New NetFilter flaw gives attackers root privileges<\/a> — A new Linux NetFilter kernel flaw has been discovered, allowing unprivileged local users to escalate their privileges to root level, allowing complete control over a system.<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-32233\" title=\"NVD - CVE-2023-32233\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">NVD – CVE-2023-32233<\/a><\/li>\n<li><a href=\"https:\/\/www.gamingonlinux.com\/2023\/05\/goodbye-to-roblox-on-linux-with-their-new-anti-cheat-and-wine-blocking\/\" title=\"Goodbye to Roblox on Linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Goodbye to Roblox on Linux<\/a> — I’m sorry to be such a downer about this, but it’s the reality. We have to spend our time porting to and supporting the platforms that will grow our community.<\/li>\n<li><a href=\"https:\/\/devforum.roblox.com\/t\/proper-support-for-the-linux-platform\/56544\/88\" title=\"Proper support for the Linux platform - Feature Requests\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Proper support for the Linux platform – Feature Requests<\/a><\/li>\n<li><a href=\"https:\/\/9to5linux.com\/ubuntu-23-04-now-works-on-starfives-visionfive-2-risc-v-single-board-computer\" title=\"Ubuntu 23.04 Now Works on StarFive’s VisionFive 2 RISC-V SBC\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Ubuntu 23.04 Now Works on StarFive’s VisionFive 2 RISC-V SBC<\/a> — ”This partnership will provide users with a seamless development experience, allowing them to leverage the best of open source software and RISC-V through Ubuntu and VisionFive 2.”<\/li>\n<li><a href=\"https:\/\/canonical.com\/blog\/canonical-enables-ubuntu-on-starfive-visionfive2-risc-v-board\" title=\"Canonical enables Ubuntu on StarFive’s VisionFive 2 RISC-V single board computer\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Canonical enables Ubuntu on StarFive’s VisionFive 2 RISC-V single board computer<\/a><\/li>\n<li><a href=\"https:\/\/events.linuxfoundation.org\/open-source-summit-north-america\/\" title=\"Open Source Summit North America\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Open Source Summit North America<\/a> — Open Source Summit is a conference umbrella, composed of a collection of events covering the most important technologies, topics, and issues affecting open source today.<\/li>\n<li><a href=\"https:\/\/siliconangle.com\/2023\/05\/10\/aws-open-sources-internally-created-snapshot-fuzzing-policy-authorization-tools\/\" title=\"AWS open-sources snapshot fuzzing and policy authorization tools\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">AWS open-sources snapshot fuzzing and policy authorization tools<\/a><\/li>\n<li><a href=\"https:\/\/events.linuxfoundation.org\/open-source-summit-north-america\/program\/schedule\/\" title=\"Schedule - Linux Foundation Events\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Schedule – Linux Foundation Events<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/linuxfoundation\/status\/1656334418133254144\" title=\"The Linux Foundation on Twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The Linux Foundation on Twitter<\/a><\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 11, 2023","link":"https:\/\/linuxactionnews.com\/292","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/dec90738-e640-45e5-b375-4573052f4bf4\/4ba6d778-5b49-4f82-9df7-2fd4fe11945e.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"8b7907fb4b6a739c986bf4c5f34e8e8b","fset":"","fratio":1},"ppe-3311-45":{"title":"Episode 102: Interview with Chris from the Gio Project","description":"<p>Episode edited by <a href=\"https:\/\/www.paritybit.ca\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Jake Bauer<\/a> — thanks!<\/p>\n<p>Discuss the episode on our <a href=\"https:\/\/forum.linuxlads.com\/d\/29-e102-interview-with-chris-from-the-gio-project\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">forum<\/a><\/p>\n<h3>Discussion<\/h3>\n<p>Amolith’s friend in code Chris masterfully expands on the previous episode by subtly correcting everything we got wrong about Gio and adding more information about the technology and the project.<\/p>\n<h4>Chat with Chris Waldon from the Gio project<\/h4>\n<ul>\n<li>\n<p><a href=\"https:\/\/gioui.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Gio’s Website<\/a><\/p>\n<\/li>\n<li>\n<p>Gio was created by <a href=\"https:\/\/sr.ht\/~eliasnaur\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Elias Naur<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.opengl.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenGL<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/vulkan.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Vulkan<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/docs.gtk.org\/gtk4\/getting_started.html\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Intro to GTK<\/a> for comparison<\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/pkg.go.dev\/gioui.org\/cmd\/gogio\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GoGio<\/a>, a CLI utility that helps build Gio apps for Android, iOS, tvOS and <a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/WebAssembly\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">WebAssembly<\/a><\/p>\n<\/li>\n<li>\n<p>Gio’s <a href=\"https:\/\/opencollective.com\/gioui\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Open Collective page<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/sourcehut.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">sourcehut<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/harfbuzz.github.io\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">HarfBuzz<\/a><\/p>\n<ul>\n<li>There is a <a href=\"https:\/\/pkg.go.dev\/github.com\/benoitkugler\/textlayout\/harfbuzz\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Go port<\/a><\/li>\n<\/ul>\n<\/li>\n<li>\n<p><a href=\"https:\/\/www.gophercon.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GopherCon<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/kakoune.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Kakoune<\/a> code editor<\/p>\n<\/li>\n<\/ul>\n<h4>Catch up with Chris<\/h4>\n<ul>\n<li>\n<p><a href=\"https:\/\/github.com\/whereswaldon\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">GitHub<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/sr.ht\/~whereswaldon\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">sourcehut<\/a><\/p>\n<\/li>\n<li>\n<p><a href=\"https:\/\/gophers.slack.com\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Gophers Slack channel<\/a><\/p>\n<\/li>\n<\/ul>\n<h3>SouthEast LinuxFest<\/h3>\n<ul>\n<li>\n<p><a href=\"https:\/\/southeastlinuxfest.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">SouthEast LinuxFest<\/a> takes place in 9-11 June in Charlotte, North Carolina<\/p>\n<\/li>\n<li>\n<p>Amolith is going to be there, write the <a href=\"https:\/\/linuxlads.com\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">show<\/a> or write <a href=\"https:\/\/secluded.site\/#contact\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">him<\/a> if you want to meet up<\/p>\n<\/li>\n<\/ul>\n<h4>Contact Us<\/h4>\n<ul>\n<li>We have a <a href=\"https:\/\/linuxlads.com\/store\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">store<\/a><\/li>\n<li>And a <a href=\"https:\/\/forum.linuxlads.com\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">forum<\/a><\/li>\n<li>And a <a href=\"http:\/\/steamcommunity.com\/groups\/linuxlads\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Steam Community<\/a><\/li>\n<li>We are on <a href=\"https:\/\/linuxlads.com\/telegram\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Telegram<\/a><\/li>\n<li>And on <a href=\"https:\/\/linuxlads.com\/matrix\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Matrix<\/a><\/li>\n<li>And on <a href=\"https:\/\/linuxlads.com\/discord\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Discord<\/a><\/li>\n<li>And on <a href=\"https:\/\/linuxlads.com\/twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Twitter<\/a><\/li>\n<li>And on <a href=\"https:\/\/linuxlads.com\/mastodon\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Mastodon<\/a><\/li>\n<li>Or email us on show@<\/li>\n<li>And despite rumours to the contrary, we do exist <a href=\"https:\/\/dublinlinux.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">in real life<\/a><\/li>\n<\/ul>\n<h4>Support Us<\/h4>\n<p>Do you enjoy the Linux Lads podcast? Send us some <a href=\"https:\/\/www.linuxlads.com\/support\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">PayPal love ❤<\/a> ️�, or support us on <a href=\"https:\/\/news.open-fab.org\/ko-fi.com\/linuxlads\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Ko-fi<\/a><\/p>\n<h4>Disclaimer<\/h4>\n<p>May contain mature references<\/p>\n<h4>Attribution<\/h4>\n<p>The music for this podcast was sampled from <a href=\"https:\/\/freemusicarchive.org\/music\/Professor_Kliq\/Bust_This_Bust_That\/Bust_This_Bust_That\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bust This Bust That – Professor Kliq<\/a> which was released under the <a href=\"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/3.0\/us\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CC BY NC SA License<\/a>.<\/p>\n","author":"Linux Lads","date":"May 11, 2023","link":"https:\/\/linuxlads.com\/episodes\/102","src":"https:\/\/dts.podtrac.com\/redirect.mp3\/linuxlads.com\/podcast\/audio\/102\/linuxlads_e102.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"076f1c66fbaf7427f506b698465d7cce","fset":"","fratio":1},"ppe-3311-46":{"title":"The Homelab Show Ep. 98 \u2013 Linux SYSTEMD Explained","description":"<figure>\n<div>\n<\/div>\n<\/figure>\n<p><a rel=\"noopener noreferrer\" href=\"https:\/\/thehomelab.show\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/thehomelab.show\/<\/a><br \/>The sponsor for today’s episode<br \/><a rel=\"noopener noreferrer\" href=\"https:\/\/www.linode.com\/homelabshow\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/www.linode.com\/homelabshow<\/a><br \/><a rel=\"noopener noreferrer\" href=\"https:\/\/lawrencesystems.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/lawrencesystems.com\/<\/a><br \/><a rel=\"noopener noreferrer\" href=\"https:\/\/www.learnlinux.tv\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/www.learnlinux.tv\/<\/a><\/p>\n","author":"The Homelab Show","date":"May 11, 2023","link":"https:\/\/thehomelab.show\/2023\/05\/11\/the-homelab-show-ep-98-linux-systemd-explained\/","src":"https:\/\/media.blubrry.com\/thehomelabshow\/thehomelab.show\/wp-content\/uploads\/2023\/05\/The-Homelab-Show-Episode-98_-Linux-SYSTEMD-Explained-.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"a53d4f27393d3f8447a465688efa708a","fset":"","fratio":1},"ppe-3311-47":{"title":"Episode 194","description":"<h2>Overview<\/h2>\n<p>The team are back from Prague and bring with them a new segment, drilling into<br \/>\nrecent academic research in the cybersecurity space – for this inaugural segment<br \/>\nnew team member Andrei looks at modelling of attacks against network intrusion<br \/>\ndetections systems, plus we cover the week in security updates looking at<br \/>\nvulnerabilities in Django, Ruby, Linux kernel, Erlang, OpenStack and more.<\/p>\n<h2>This week in Ubuntu Security Updates<\/h2>\n<p>57 unique CVEs addressed<\/p>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6054-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6054-1<\/a>] Django vulnerability (00:55)<\/h3>\n<ul>\n<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-31047\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-31047<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Django supports file uploading via various form constructs – it then performs<br \/>\nvalidation on the file<\/li>\n<li>Was possible to upload multiple files via the form by attacking more than one<br \/>\nHTML attribute to the form – in this case though only the last file would be<br \/>\nvalidated – and so other files would escape validation<\/li>\n<li>Fixed to have Django raise an error in the case that an application tries to<br \/>\nuse these forms for multiple files and adds a new option to restore the old<br \/>\nbehaviour if really desired – AND it adds support for validating all files in<br \/>\nthis case.<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6055-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6055-1<\/a>] Ruby vulnerabilities (02:11)<\/h3>\n<ul>\n<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-28756\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-28756<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-28755\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-28755<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Two ReDoS issues – ability to cause a CPU-based DoS through crafted input that<br \/>\nis then validated by a regex which takes an inordinate amount of time to run<\/p>\n<ul>\n<li>one in URI parsing and the other in Time parsing<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6055-2\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6055-2<\/a>] Ruby regression (03:11)<\/h3>\n<ul>\n<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-28755\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-28755<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>The URI parser regex fix caused a regression and so was reverted – is still<br \/>\nunder investigation and hope to fix it again in a future update<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6056-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6056-1<\/a>] Linux kernel (OEM) vulnerability (03:13)<\/h3>\n<ul>\n<li>1 CVEs addressed in Jammy (22.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1859\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1859<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>UAF in Xen Plan 9 file system protocol -> DoS \/ info leak<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6057-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6057-1<\/a>] Linux kernel (Intel IoTG) vulnerabilities (03:31)<\/h3>\n<ul>\n<li>10 CVEs addressed in Jammy (22.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-26545\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-26545<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1652\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1652<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1074\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1074<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1073\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1073<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0394\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0394<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4842\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4842<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-47929\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-47929<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-4129\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-4129<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-0386\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-0386<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1281\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1281<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>OverlayFS is a union file-system, allowing one FS to be stacked on top of<br \/>\nanother – often used for things like schroots where you want to have the<br \/>\npristine source and then a working session chroot where you can make changes<br \/>\nand then finally dispose of the whole thing back to the original<\/p>\n<ul>\n<li>Interaction with setuid binaries and the nosuid mount option – nosuid means<br \/>\nthe suid bit is ignored – in this case, if had setup an overlay with the<br \/>\nbase file-system mounted nosuid, then in some cases it would be possible to<br \/>\ncopy up an suid binary as an unprivileged user and have it retain the suid<br \/>\nbit – and then the user could just execute it to gain root privileges<\/li>\n<\/ul>\n<\/li>\n<li>UAF in Traffic-Control Index (TCINDEX) filter – found in March this year<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6058-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6058-1<\/a>] Linux kernel vulnerability (05:45)<\/h3>\n<ul>\n<li>1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1829\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1829<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Another UAF in Traffic-Control Index (TCINDEX) filter from April this year –<br \/>\nseems upstream is sick of these UAFs in TCINDEX so their fix simply removes<br \/>\nthis classifier from the kernel and hence so does ours – in general we try not<br \/>\nto introduce breaking changes but in this case prefer to stay consistent with<br \/>\nupstream – also upstream say this does not have many known users anyway<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6059-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6059-1<\/a>] Erlang vulnerability (06:23)<\/h3>\n<ul>\n<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-37026\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-37026<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Failed to properly maintain state during TLS handshake when validating client<br \/>\ncertificate – basically a malicious client could send the certificate and then<br \/>\nsimply omit the TLS handshake message which tells the server to validate the<br \/>\ncert and the server state would then show the cert had been validated<\/li>\n<li>Note only affects Erlang applications that use client certificates for<br \/>\nauthentication (ie. the <code>'{verify, verify_peer}'<\/code> SSL option)<\/li>\n<li>Still planning to try and update erlang in bionic (18.04 LTS) but backport is<br \/>\nmore complicated<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6060-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6060-1<\/a>, <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6060-2\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6060-2<\/a>] MySQL vulnerabilities (07:40)<\/h3>\n<ul>\n<li>20 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21982\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21982<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21980\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21980<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21977\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21977<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21976\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21976<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21972\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21972<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21966\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21966<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21962\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21962<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21955\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21955<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21953\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21953<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21947\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21947<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21946\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21946<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21945\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21945<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21940\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21940<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21935\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21935<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21933\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21933<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21929\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21929<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21920\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21920<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21919\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21919<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21912\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21912<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21911\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21911<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>2 CVEs addressed in Xenial ESM (16.04 ESM)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21980\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21980<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-21912\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-21912<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Latest upstream releases\n<ul>\n<li>8.0.33 for 20.04 LTS, 22.04 LTS, 22.10, and Lunar (23.04)<\/li>\n<li>5.7.42 for 16.04 ESM and 18.04 LTS<\/li>\n<\/ul>\n<\/li>\n<li>As is the latest upstream point release, also includes bug fixes and possibly<br \/>\nnew features \/ incompatible changes – full list of details from upstream:<\/p>\n<ul>\n<li><a href=\"https:\/\/dev.mysql.com\/doc\/relnotes\/mysql\/5.7\/en\/news-5-7-42.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/dev.mysql.com\/doc\/relnotes\/mysql\/5.7\/en\/news-5-7-42.html<\/a><\/li>\n<li><a href=\"https:\/\/dev.mysql.com\/doc\/relnotes\/mysql\/8.0\/en\/news-8-0-33.html\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/dev.mysql.com\/doc\/relnotes\/mysql\/8.0\/en\/news-8-0-33.html<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6061-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6061-1<\/a>] WebKitGTK vulnerabilities (08:14)<\/h3>\n<ul>\n<li>6 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-28205\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-28205<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-27954\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-27954<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-27932\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-27932<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-25358\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-25358<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-32885\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-32885<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-0108\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-0108<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Various UAFs plus ability to track users across origins or bypass same origin<br \/>\npolicy<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6062-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6062-1<\/a>] FreeType vulnerability (08:38)<\/h3>\n<ul>\n<li>1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-2004\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-2004<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Integer overflow when parsing a malformed font – DoS \/ RCE (particurly with<br \/>\nthe advent of web fonts)<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6063-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6063-1<\/a>] Ceph vulnerabilities (09:03)<\/h3>\n<ul>\n<li>4 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3854\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3854<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3650\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3650<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-0670\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-0670<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-3979\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-3979<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>backport of:\n<ul>\n<li>17.2.5 for 22.10, 22.04 LTS<\/li>\n<li>15.2.17 for 20.04 LTS<\/li>\n<li>12.2.13 for 18.04 LTS<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6066-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6066-1<\/a>] OpenStack Heat vulnerability (09:29)<\/h3>\n<ul>\n<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1625\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1625<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Orchestration Service for OpenStack – info leak via API<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6067-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6067-1<\/a>] OpenStack Neutron vulnerabilities (09:39)<\/h3>\n<ul>\n<li>5 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-3277\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-3277<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-40797\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-40797<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-40085\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-40085<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-38598\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-38598<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-20267\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-20267<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Virtual Network Service<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6068-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6068-1<\/a>] Open vSwitch vulnerability (09:45)<\/h3>\n<ul>\n<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-1668\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-1668<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Failed to properly handle IP packets which specified a protocol of 0 (used in<br \/>\nIPv6 to specify hop-by-hop options) – if a packet with protocol 0 was<br \/>\nencountered, OVS would install a dataflow path for both kernel and userspace<br \/>\nwhich would match on ALL IP protocols for this flow – so this would then<br \/>\npossibly match against other IP packets and so cause them to be handled<br \/>\nincorrectly (possibly allowing when should have been denied etc)<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6065-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6065-1<\/a>] css-what vulnerabilities (10:43)<\/h3>\n<ul>\n<li>2 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-21222\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2022-21222<\/a> <!-- raw HTML omitted --><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-33587\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2021-33587<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>CSS selector parser for NodeJS<\/li>\n<li>Two ReDoS issues<\/li>\n<\/ul>\n<h3>[<a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-6064-1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">USN-6064-1<\/a>] SQL parse vulnerability (11:00)<\/h3>\n<ul>\n<li>1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)\n<ul>\n<li><a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-30608\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CVE-2023-30608<\/a> <!-- raw HTML omitted --><\/li>\n<\/ul>\n<\/li>\n<li>Another ReDoS<\/li>\n<\/ul>\n<h2>Goings on in Ubuntu Security Community<\/h2>\n<h3>Ubuntu 23.10 release cycle opens (11:41)<\/h3>\n<ul>\n<li>The Ubuntu Security is back from Prague (Engineering Sprint) – spent the week<br \/>\ndiving deep into various aspects like what kinds of tooling and processes we<br \/>\nwant to try and improve across the team, talking about the culture and history<br \/>\nof the team to make sure we maintain our great culture as the team grows.<\/li>\n<li>Even discussing mundane stuff like how to refer to and name security updates<br \/>\nwhich go into Ubuntu Pro vs the regular Ubuntu Archive – making sure it is<br \/>\nclear to consumers of our USNs etc what is where, plus the various policies<br \/>\naround updated for Ubuntu Pro<\/li>\n<li>Sessions devoted to snaps and how to do appropriate security reviews for them<br \/>\nplus how to coordinate better with the snapd team<\/li>\n<li>Even looking at tech debt within our team and our tooling and how we can try<br \/>\nand tackle some of that<\/li>\n<li>As for more concrete plans for the security team during 23.10\n<ul>\n<li>continue the work to use AppArmor to enable tighter controls over<br \/>\nunprivileged user namespaces within Ubuntu<\/li>\n<li>various improvements to our <a href=\"https:\/\/ubuntu.com\/security\/oval\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OVAL<\/a> feeds to make them more useful to users and<br \/>\ncustomers alike<\/li>\n<li>utilising the Canonical Hardware Certifications Lab for testing of security<br \/>\nupdates for packages that require particular hardware (think things like<br \/>\n<code>intel-microcode<\/code>, <code>nvme-cli<\/code>, various graphics drivers etc)<\/li>\n<li>Improvements to AppArmor for more fine-grained network mediation and<br \/>\n<code>io_uring<\/code><\/li>\n<li>More work on supporting various confidential computing use-cases (for an<br \/>\nintroduction to these types of topics see<br \/>\n<a href=\"https:\/\/ubuntu.com\/engage\/introduction-to-confidential-computing-webinar\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/ubuntu.com\/engage\/introduction-to-confidential-computing-webinar<\/a>)<\/li>\n<li>Usual work on FIPS \/ CIS \/ DISA-STIG updates plus usual security maintenance<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Academic paper review with Andrei Iosif (14:40)<\/h3>\n<ul>\n<li>New segment to dig into the details of various interesting cybersecurity<br \/>\nresearch papers<\/li>\n<li>Andrei joined the team just over 1 month ago – previously was Tech Lead at a<br \/>\nSecOps startup developing open source tools for automating various<br \/>\ncybersecurity solutions – brings a wide range of great experience to our team<\/li>\n<li><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3469659\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems<\/a><\/li>\n<li>Looks at what the study was about (developing a model for attacks against<br \/>\nNetwork Intrusion Detection Systems, with a particular focus on IDSs that are<br \/>\nbased on AI\/ML approaches)<\/li>\n<\/ul>\n<h2>Get in contact<\/h2>\n<ul>\n<li><a href=\"mailto:security@ubuntu.com\" rel=\"noopener noreferrer\" target=\"_blank\">security@ubuntu.com<\/a><\/li>\n<li><a href=\"https:\/\/libera.chat\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">#ubuntu-security on the Libera.Chat IRC network<\/a><\/li>\n<li><a href=\"https:\/\/lists.ubuntu.com\/mailman\/listinfo\/ubuntu-hardened\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">ubuntu-hardened mailing list<\/a><\/li>\n<li><a href=\"https:\/\/discourse.ubuntu.com\/c\/security\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Security section on discourse.ubuntu.com<\/a><\/li>\n<li><a href=\"https:\/\/fosstodon.org\/@ubuntusecurity\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">@ubuntusecurity<\/a>, <a href=\"https:\/\/twitter.com\/ubuntu_sec\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">@ubuntu_sec on twitter<\/a><\/li>\n<\/ul>\n","author":"Ubuntu Security Team","date":"May 11, 2023","link":"https:\/\/ubuntusecuritypodcast.org\/episode-194\/","src":"https:\/\/people.canonical.com\/~amurray\/USP\/USP_E194.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"3f3eb646375583ee64d9a57bfa2c547e","fset":"","fratio":1},"ppe-3311-48":{"title":"506: A greener BSD","description":"<p>Comparing Modern Open-Source Storage Solutions, FreeBSD Q1 Status Report, Hello Systems 0.8.1 Release, OpenBSD: Managing an inverter\/converter with NUT, Tips for Running a Greener FreeBSD, BSDCAN Registration open<\/p>\n<p><strong><em>NOTES<\/em><\/strong><br \/>\nThis episode of BSDNow is brought to you by <a href=\"https:\/\/www.tarsnap.com\/bsdnow\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tarsnap<\/a> and the <a href=\"https:\/\/www.patreon.com\/bsdnow\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">BSDNow Patreon<\/a><\/p>\n<h2>Headlines<\/h2>\n<h3><a href=\"https:\/\/klarasystems.com\/articles\/openzfs-comparing-modern-open-source-storage-solutions\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Comparing Modern Open-Source Storage Solutions OpenZFS vs. The Rest<\/a><\/h3>\n<hr>\n<h3><a href=\"https:\/\/www.freebsd.org\/status\/report-2023-01-2023-03\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">FreeBSD Q1 Status Report<\/a><\/h3>\n<hr>\n<h2>News Roundup<\/h2>\n<h3><a href=\"https:\/\/github.com\/helloSystem\/ISO\/releases\/tag\/r0.8.1\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Hello Systems 0.8.1 Release<\/a><\/h3>\n<hr>\n<h3><a href=\"https:\/\/doc.huc.fr.eu.org\/en\/sys\/openbsd\/nut\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">OpenBSD: Managing an inverter\/converter with NUT<\/a><\/h3>\n<hr>\n<h3><a href=\"https:\/\/freebsdfoundation.org\/blog\/celebrating-earth-day-tips-for-running-a-greener-freebsd\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Celebrating Earth Day: Tips for Running a Greener FreeBSD<\/a><\/h3>\n<hr>\n<h3><a href=\"https:\/\/www.bsdcan.org\/2023\/registration.php\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">BSDCAN Registration<\/a><\/h3>\n<hr>\n<h2>Beastie Bits<\/h2>\n<pre><code>• [SimCity 2000 running on OpenBSD 7.3 via DOSBox 0.74-3](https:\/\/www.reddit.com\/r\/openbsd_gaming\/comments\/12k9zt2\/simcity_2000_running_on_openbsd_73_via_dosbox_0743\/)\n• [OpenBSD Webzine #13](https:\/\/webzine.puffy.cafe\/issue-13.html)\n• [AWS Gazo bot](https:\/\/github.com\/csaltos\/aws-gazo-bot)\n<\/code><\/pre>\n<hr>\n<h3>Tarsnap<\/h3>\n<ul>\n<li>\n<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.<\/p>\n<\/li>\n<li>\n<p>Send questions, comments, show ideas\/topics, or stories you want mentioned on the show to <a href=\"mailto:feedback@bsdnow.tv\" rel=\"noopener noreferrer\" target=\"_blank\">feedback@bsdnow.tv<\/a><\/p>\n<hr>\n<\/li>\n<\/ul>\n","author":"Allan Jude","date":"May 11, 2023","link":"https:\/\/www.bsdnow.tv\/506","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/c91b88f1-e824-4815-bcb8-5227818d6010\/a130428b-d80d-45a3-a07b-e7b6ce4b3565.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"78bc325d10c6facf53242324ad4e4d49","fset":"","fratio":1},"ppe-3311-49":{"title":"The Linux Link Tech Show Episode 1004","description":"<p>joel folds his phone.<\/p>\n","author":"dann@thelinuxlink.net (Dann Washko, Linc Fessenden, Pat Davila, Allan Metzler)","date":"May 11, 2023","link":"http:\/\/www.tllts.org","src":"http:\/\/www.tlltsarchive.org\/archives\/tllts_1004-05-10-23.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"62a2121d54e3145213bfaadd026389f4","fset":"","fratio":1},"ppe-3311-50":{"title":"411.5 \u2013 Origins of The GUI","description":"<p>In our Innards section, we talk about the origins of the desktop;<\/p>\n<p>We had no feedback this episode. Please email us! We’d love to hear from you!<\/p>\n<h2><a rel=\"noopener noreferrer\" href=\"https:\/\/mintcast.org\/show-notes\/episode-411-show-notes\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><span>Full Show notes can be found here<\/span><\/a><\/h2>\n<h3>Wrap-up<\/h3>\n<ul>\n<li><strong>Joe<\/strong> – <a href=\"http:\/\/www.tllts.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Tllts.org<\/u><\/a>, <a href=\"http:\/\/www.linuxlugcast.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>linuxlugcast.com<\/u><\/a>, MeWe, <a href=\"mailto:jb@mintcast.org\" rel=\"noopener noreferrer\" target=\"_blank\"><u>jb@mintcast.org<\/u><\/a>, <a href=\"https:\/\/ko-fi.com\/joeeb\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Buy Joe a coffee<\/u><\/a><\/li>\n<li><a><\/a><strong>Moss <\/strong>– <a href=\"https:\/\/fullcirclemagazine.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Full Circle Weekly News<\/u><\/a>, <a href=\"https:\/\/distrohoppersdigest.blogspot.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Distrohoppers’ Digest<\/u><\/a>, <a href=\"mailto:bardmoss@pm.me\" rel=\"noopener noreferrer\" target=\"_blank\"><u>bardmoss@pm.me<\/u><\/a>, I’m on Mastodon as @zaivala, and other contact information can be found at <a href=\"https:\/\/itsmoss.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">It’s <\/a><a href=\"https:\/\/itsmoss.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Moss dot com<\/a><\/li>\n<li><strong>Bill <\/strong>– <a href=\"mailto:bill@mintcast.org\" rel=\"noopener noreferrer\" target=\"_blank\"><u>bill@mintcast.org<\/u><\/a>, Bill_H on Discord, @wchouser3 on Mastodon, @wchouser3 on Twitter, and wchouser3 on Facebook also – checkout my other podcasts <a href=\"https:\/\/linuxotc.org\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linux OTC<\/a> and 3 Fat Truckers<\/li>\n<li><a><\/a><strong>Majid<\/strong> – drmajid@mintcast.org @atypicaldoctor on twitter, AtypicalAnaesthetist on instagram and <strong><a href=\"https:\/\/open.spotify.com\/show\/6Uo4DsJE8fJmvo8npljbmx\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The Atypical Anaesthetist Podcast<\/a><\/strong> on Spotify (https:\/\/open.spotify.com\/show\/6Uo4DsJE8fJmvo8npljbmx)<\/li>\n<li><strong>Dale<\/strong> – <a href=\"mailto:Dale_CDL@pm.me\" rel=\"noopener noreferrer\" target=\"_blank\">Dale_CDL@pm.me<\/a>, <a href=\"https:\/\/distrohoppersdigest.blogspot.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><u>Distrohoppers’ Digest<\/u><\/a>, <a href=\"https:\/\/itsmoss.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">It’s Moss dot Com<\/a><\/li>\n<\/ul>\n<h4>Before we leave, we want to make sure to acknowledge some of the people who make mintCast possible:<\/h4>\n<ul>\n<li><strong>Joe<\/strong> for our audio editing<\/li>\n<li><strong>Archive.org<\/strong> for hosting our audio files<\/li>\n<li><strong>Hobstar<\/strong> for our logo, <strong>initrd<\/strong> for the animated Discord logo<\/li>\n<li><strong>Londoner<\/strong> for our time syncs<\/li>\n<li><strong>Bill Houser<\/strong> for hosting the server which runs our website, website maintenance, and the NextCloud server on which we host our show notes and raw audio<\/li>\n<li><strong>The Linux Mint development team <\/strong>for the fine distro we love to talk about <Thanks, Clem … and co!<\/li>\n<\/ul>\n","author":"mintCast","date":"May 10, 2023","link":"https:\/\/mintcast.org\/411-5-origins-of-the-gui\/","src":"https:\/\/archive.org\/download\/mintCast411.5\/ep411.5.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"979f4e7131a9bc1605f38fe56cbb1d5e","fset":"","fratio":1},"ppe-3311-51":{"title":"Enterprise Linux Security Episode 66 \u2013 Job Security","description":"<p>In this episode, Jay and Joao discuss another form of security, job security! Throughout the series, we’ve advised and educated on enhancing the security of your enterprise network, but in this episode the focus is on YOU. Specifically, how to safeguard yourself from turnover, raise awareness of your importance to your organization, and how to navigate potential “awkward” conversations that System Administrators may find themselves having with their boss. Don’t miss this episode!<\/p>\n<figure>\n<div>\n<div><img loading=\"lazy\" alt=\"YouTube player\" src=\"https:\/\/i.ytimg.com\/vi\/e92HQWB4EM8\/maxresdefault.jpg\"><\/div>\n<\/div>\n<\/figure>\n<h2>Download links<\/h2>\n<ul>\n<li><a href=\"https:\/\/enterpriselinuxsecurity.show\/wp-content\/uploads\/2023\/05\/els_66.mp3\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">MP3 version<\/a><\/li>\n<li><a href=\"https:\/\/enterpriselinuxsecurity.show\/wp-content\/uploads\/2023\/05\/els_66_low.mp3\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">MP3 version<\/a> (lower bitrate, smaller file size)<\/li>\n<li><a rel=\"noopener noreferrer\" href=\"https:\/\/enterpriselinuxsecurity.show\/wp-content\/uploads\/2023\/05\/els_66.ogg\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Ogg version<\/a><\/li>\n<\/ul>\n","author":"jay","date":"May 10, 2023","link":"https:\/\/www.learnlinux.tv\/enterprise-linux-security-episode-66-job-security\/","src":"https:\/\/enterpriselinuxsecurity.show\/wp-content\/uploads\/2023\/05\/els_66.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"bec5b70aa21f13f7b7c50ea751fd3d3c","fset":"","fratio":1},"ppe-3311-52":{"title":"FLOSS Weekly 731: Confidential Computing – Dan Middleton, Confidential Computing Consortium","description":"<p>Dan Middleton, of Intel and the Confidential Computing Consortium (CCC), dives deep on the topic of confidential computing (CoCo) and many related concerns, such as Trusted Execution Environments with Doc Searls and Jonathan Bennett.<\/p>\n<p><strong>Hosts:<\/strong> <a href=\"https:\/\/twit.tv\/people\/doc-searls\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Doc Searls<\/a> and <a href=\"https:\/\/twit.tv\/people\/jonathan-bennett\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Jonathan Bennett<\/a><\/p>\n<p><strong>Guest:<\/strong> <a href=\"https:\/\/twitter.com\/dcmiddle1\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Dan Middleton<\/a><\/p>\n<p>Download or subscribe to this show at <a href=\"https:\/\/twit.tv\/shows\/floss-weekly\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/twit.tv\/shows\/floss-weekly<\/a><\/p>\n<p>Think your open source project should be on FLOSS Weekly? Email <a href=\"mailto:floss@twit.tv\" rel=\"noopener noreferrer\" target=\"_blank\">floss@twit.tv<\/a>.<\/p>\n<p>Thanks to <a href=\"https:\/\/www.lullabot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Lullabot’s<\/a> Jeff Robbins, web designer and musician, for our theme music.<\/p>\n<p>Get episodes ad-free with Club TWiT at <a href=\"https:\/\/twit.tv\/clubtwit\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/twit.tv\/clubtwit<\/a><\/p>\n","author":"TWiT","date":"May 10, 2023","link":"https:\/\/twit.tv\/shows\/floss-weekly\/episodes\/731","src":"https:\/\/pdst.fm\/e\/cdn.twit.tv\/audio\/floss\/floss0731\/floss0731.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"1d6ef1e448a050e8e83475a8d1ac64c2","fset":"","fratio":1},"ppe-3311-53":{"title":"517: Savage Serverless Shutdown","description":"<p>A scathing takedown of Serverless… By Amazon? We react to this strange revelation and more.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"https:\/\/linode.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode<\/a>: <a href=\"https:\/\/linode.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Receive a $100 60-day credit towards your new account. <\/a> Promo Code: linode.com\/coder<\/li>\n<li><a href=\"https:\/\/tailscale.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale<\/a>: <a href=\"https:\/\/tailscale.com\/coder\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale is the easiest way to create a peer-to-peer network with the power of Wireguard. <\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/jupitersignal.memberful.com\/checkout?plan=53334\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support Coder Radio<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/twitter.com\/Tech_Reve\/status\/1653641879249092609\" title=\"Revegnus on Twitter\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Revegnus on Twitter<\/a> — Update: No M3 Mac or iPad for this year<br \/>\nDue to yield issues with TSMC not being able to supply enough of the M3 to Apple, Apple has delayed the release of the M3 until next year.<br \/>\nSo there will be no M3 Macs and no M3 iPads this year.<\/li>\n<li><a href=\"https:\/\/wccftech.com\/intel-14th-gen-meteor-lake-s-desktop-cpu-support-added-linux-patch\/\" title=\"Intel 14th Gen Meteor Lake-S Desktop CPU Support Added In Latest Linux Patch\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Intel 14th Gen Meteor Lake-S Desktop CPU Support Added In Latest Linux Patch<\/a> — There’s more evidence now that Intel is going to launch its 14th Gen Meteor Lake CPU family on the desktop platform. <\/li>\n<li><a href=\"https:\/\/world.hey.com\/dhh\/even-amazon-can-t-make-sense-of-serverless-or-microservices-59625580\" title=\"Even Amazon can't make sense of serverless or microservices\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Even Amazon can’t make sense of serverless or microservices<\/a> —<br \/>\n “We designed our initial solution as a distributed system using serverless components… In theory, this would allow us to scale each service component independently. However, the way we used some components caused us to hit a hard scaling limit at around 5% of the expected load.”<\/p>\n<\/li>\n<li><a href=\"https:\/\/www.primevideotech.com\/video-streaming\/scaling-up-the-prime-video-audio-video-monitoring-service-and-reducing-costs-by-90\" title=\"Scaling up the Prime Video audio\/video monitoring service and reducing costs by 90%\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Scaling up the Prime Video audio\/video monitoring service and reducing costs by 90%<\/a> — We designed our initial solution as a distributed system using serverless components (for example, AWS Step Functions or AWS Lambda.<\/li>\n<li><a href=\"https:\/\/stackoverflow.blog\/2023\/05\/08\/the-2023-developer-survey-is-now-live\/\" title=\"The 2023 Developer Survey is now live!\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The 2023 Developer Survey is now live!<\/a> — It’s that time of year again where we come to the community to say, “It’s that time of year again,” again! <\/li>\n<li><a href=\"https:\/\/gbatemp.net\/threads\/nintendo-reportedly-issues-dmca-takedown-for-switch-homebrew-projects-skyline-switch-emulator-development-ceased.632406\/\" title=\"Nintendo reportedly issues DMCA takedown for Switch homebrew projects\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nintendo reportedly issues DMCA takedown for Switch homebrew projects<\/a> — Some fallout from the early leak of The Legend of Zelda: Tears of the Kingdom appears to be taking place. As players are loading the game into emulators and playing them unofficially on their computers, prior to the launch date, Nintendo is taking action to prevent that from happening.<\/li>\n<li><a href=\"https:\/\/getalby.com\/\" title=\"Alby: Your Boost companion for the web\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Alby: Your Boost companion for the web<\/a> — Alby lets you send Boosts from websites like the Podcast Index and Podverse.fm<\/li>\n<li><a href=\"https:\/\/podcastindex.org\/podcast\/487548\" title=\"Coder Radio on the Podcastindex.org\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Coder Radio on the Podcastindex.org<\/a> — Send a Boost into the show via the web. First, top-up Alby, then head over to our entry on the Podcast Index.<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 10, 2023","link":"https:\/\/coder.show\/517","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/b44de5fa-47c1-4e94-bf9e-c72f8d1c8f5d\/bca7d297-5610-4549-b565-97db2cc1487e.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"2d9a6a3faef94cd797664b29e5c72049","fset":"","fratio":1},"ppe-3311-54":{"title":"Late Night Linux \u2013 Episode 228","description":"<p>We come up with tips for new users, and realise how complicated a lot of the things we do with Linux are. Plus emulating a Wii U, a cheeky hack for virtualising Linux on M1 Macs, more on DNS and Yubikeys, and more.<\/p>\n<p> <\/p>\n<p><strong>Discoveries<\/strong><\/p>\n<p><a href=\"https:\/\/github.com\/cemu-project\/Cemu\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CEMU<\/a><\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p><strong>TrueNAS from iXsystems<\/strong><\/p>\n<p>To learn more about TrueNAS and download it for free, visit <a href=\"http:\/\/truenas.com\/lnl\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>truenas.com\/lnl<\/strong><\/a><\/p>\n<p> <\/p>\n<div>\n<div>\n<p><strong>Linode<\/strong><\/p>\n<p>Simplify your cloud infrastructure with Linode’s Linux virtual machines and develop, deploy, and scale your modern applications faster and more easily. Go to <a href=\"https:\/\/linode.com\/latenightlinux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\"><strong>linode.com\/latenightlinux<\/strong><\/a> and get started with $100 credit.<\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<p> <\/p>\n<div>\n<div>\n<div>\n<div>\n<p>See our <a href=\"https:\/\/latenightlinux.com\/contact\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">contact page<\/a> for ways to get in touch.<\/p>\n<p><img loading=\"lazy\" src=\"https:\/\/latenightlinux.com\/wp-content\/uploads\/latenightlinux-sm.jpg\"><\/p>\n<p><strong>RSS<\/strong>: Subscribe to the <a href=\"https:\/\/latenightlinux.com\/feeds\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">RSS feeds here<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","author":"Late Night Linux Family All Episodes","date":"May 8, 2023","link":"https:\/\/latenightlinux.com\/late-night-linux-episode-228\/","src":"https:\/\/podtrac.com\/pts\/redirect.mp3\/traffic.libsyn.com\/latenightlinux\/LNL228.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"070d1c64e8f0a7043b853941ffe59908","fset":"","fratio":1},"ppe-3311-55":{"title":"322: Interview with Mark Shuttleworth of Canonical & Ubuntu","description":"<p>FULL SHOW NOTES ►► <a href=\"https:\/\/tuxdigital.com\/podcasts\/destination-linux\/dl-322\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">https:\/\/tuxdigital.com\/podcasts\/destination-linux\/dl-322\/<\/a><\/p>\n","author":"TuxDigital Network","date":"May 8, 2023","link":"https:\/\/destinationlinux.org\/episode-322\/","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/32f28071-0b08-4ea1-afcc-37af75bd83d6\/e4eef335-f6cb-426d-b0ee-f25bcff859c3.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"b65ee0ba0cb15e0dec62691b5350453b","fset":"","fratio":1},"ppe-3311-56":{"title":"509: The Next Gen Desktop","description":"<p>The first new desktop environment in a while that has caught our attention, and it promises to unlock the full power of cutting-edge Linux.<\/p>\n<p>Why we think every desktop will copy ideas from Hyprland soon.<\/p>\n<p>Sponsored By:<\/p>\n<ul>\n<li><a href=\"http:\/\/tailscale.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale<\/a>: <a href=\"http:\/\/tailscale.com\/\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere. Get 20 devices for free for a personal account. <\/a><\/li>\n<li><a href=\"https:\/\/linode.com\/unplugged\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Linode Cloud Hosting<\/a>: <a href=\"https:\/\/linode.com\/unplugged\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">A special offer for all Linux Unplugged Podcast listeners and new Linode customers, visit linode.com\/unplugged, and receive $100 towards your new account. <\/a><\/li>\n<li><a href=\"https:\/\/bitwarden.com\/linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bitwarden<\/a>: <a href=\"https:\/\/bitwarden.com\/linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Bitwarden is the easiest way for businesses and individuals to store, share, and sync sensitive data.<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/jupitersignal.memberful.com\/checkout?plan=52946\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Support LINUX Unplugged<\/a><\/p>\n<p>Links:<\/p>\n<ul>\n<li><a href=\"https:\/\/hyprland.org\/rices\" title=\"Hyprland Hall of Fame\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Hyprland Hall of Fame<\/a><\/li>\n<li><a href=\"https:\/\/wiki.hyprland.org\/Getting-Started\/Master-Tutorial\/\" title=\"Hyprland Master Tutorial\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Hyprland Master Tutorial<\/a> — If you are coming to Hyprland for the first time, this is the main tutorial to read.<\/li>\n<li><a href=\"https:\/\/wiki.archlinux.org\/title\/Hyprland\" title=\"Hyprland - ArchWiki\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Hyprland – ArchWiki<\/a> — Hyprland bundles its own version of wlroots, which closely follows the wlroots-git. This improves stability, while also avoiding dependency conflicts with other wlroots-based compositors.<\/li>\n<li><a href=\"https:\/\/wiki.hyprland.org\/Nix\/\" title=\"Nix | Hyprland Wiki\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nix | Hyprland Wiki<\/a> — Hyprland on Nix can be installed either from Nixpkgs (release version) or from the flake (directly from the main branch).<\/li>\n<li><a href=\"https:\/\/wiki.hyprland.org\/Nix\/Hyprland-on-NixOS\/\" title=\"Hyprland on NixOS\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Hyprland on NixOS<\/a> — The NixOS module enables critical components needed to run Hyprland properly, such as: polkit, xdg-desktop-portal-hyprland, graphics drivers, fonts, dconf, xwayland, and adding a proper Desktop Entry to your Display Manager.<\/li>\n<li><a href=\"https:\/\/github.com\/hyprland-community\/awesome-hyprland#runners-menus-and-application-launchers\" title=\"awesome-hyprland\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">awesome-hyprland<\/a> — Useful tools and libraries that either work or are designed for Hyprland!<\/li>\n<li><a href=\"https:\/\/www.jupiterbroadcasting.com\/show\/self-hosted\/96\/\" title=\"Outdoor Home Assistant\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Outdoor Home Assistant<\/a> — Why Chris needs ANOTHER Home Assistant instance and a major breakthrough for self-hosters.<\/li>\n<li><a href=\"https:\/\/www.thesprinklergeek.com\/\" title=\"The Sprinkler Geeks, LLC\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The Sprinkler Geeks, LLC<\/a> — Irrigation service, repair, and maintenance. Servicing Thurston, Lewis, & Gray’s Harbor Counties.<\/li>\n<li><a href=\"https:\/\/www.dataswitchworks.com\/ICX-6610-24P.asp\" title=\"Brocade ICX 6610-24P Switch\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Brocade ICX 6610-24P Switch<\/a><\/li>\n<li><a href=\"https:\/\/paste.docs.lol\/reader\/SinkHolographs\" title=\"Boost Vs Patreon\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Boost Vs Patreon<\/a> — I have one friend who loves podcasts, but he still doesn’t get how it offers anything new compared to Patreon. Could you guys please give a short rundown of how boosts are different and how they have helped LUP?<\/li>\n<li><a href=\"https:\/\/help.evernote.com\/hc\/en-us\/articles\/208313748-Evernote-on-Linux\" title=\"Evernote on Linux\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Evernote on Linux<\/a> — Evernote for Linux is currently in private beta.<\/li>\n<li><a href=\"https:\/\/github.com\/xwmx\/nb\" title=\"xwmx\/nb\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">xwmx\/nb<\/a> — nb is a command line and local web note‑taking, bookmarking, archiving, and knowledge base application<\/li>\n<li><a href=\"https:\/\/www.ecowitt.com\/shop\/homePage\" title=\"Ecowitt weather station\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Ecowitt weather station<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/yaronzz\/Tidal-Media-Downloader\" title=\"Tidal-Media-Downloader\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Tidal-Media-Downloader<\/a> — Tidal-Media-Downloader is an application that lets you download videos and tracks from Tidal.<\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=qrHFg47Mopk\" title=\"When Stars and Salt Collide” by The Piano Guys.\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">When Stars and Salt Collide” by The Piano Guys.<\/a><\/li>\n<li><a href=\"https:\/\/podcastindex.org\/apps?appTypes=app&elements=Value\" title=\"Podcasting 2.0 Apps\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Podcasting 2.0 Apps<\/a><\/li>\n<li><a href=\"https:\/\/getalby.com\/\" title=\"Alby\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Alby<\/a><\/li>\n<li><a href=\"https:\/\/podcastindex.org\/podcast\/575694\" title=\"LINUX Unplugged on the Podcastindex.org\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">LINUX Unplugged on the Podcastindex.org<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/madiele\/vod2pod-rss\" title=\"Vod2pod-rss\" rel=\"noopener noreferrer\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Vod2pod-rss<\/a> — Vod2Pod-RSS converts a YouTube or Twitch channel into a podcast with ease. It creates a podcast RSS that can be listened to directly inside any podcast client.<\/li>\n<\/ul>\n","author":"Jupiter Broadcasting","date":"May 8, 2023","link":"https:\/\/linuxunplugged.com\/509","src":"https:\/\/aphid.fireside.fm\/d\/1437767933\/f31a453c-fa15-491f-8618-3f71f1d565e5\/adf0e688-6480-4036-a396-37b6a478bc31.mp3","featured":"","mediatype":"audio","duration":"00:00","key":"38480593c31a916c714a0e530e2f9519","fset":"","fratio":1},"load_info":{"loaded":56,"displayed":28,"maxItems":1576,"src":"4deddb64be49563ae2b02b2de3a00bc1","step":28,"sortby":"sort_date_desc","filterby":"","fixed":"","args":{"imgurl":"","imgset":"","display":"","hddesc":0,"hdfeat":0,"oricov":"","elength":180}},"rdata":{"permalink":"https:\/\/open-fab.org\/podcasts","fprint":"4deddb64be49563ae2b02b2de3a00bc1","from":"feedurl","elen":180,"eunit":"char","teaser":"","title":"Podcasts – IT – EN"}}">
Podcasts – IT – EN
Episode 197
Overview
The venerable Ubuntu 18.04 LTS release has transitioned into ESM, plus we look
at Till Kamppeter’s excellent guide on how to set up your GitHub projects to
receive private vulnerability reports, and we cover the week in security updates
including PostgreSQL, Jhead, the Linux kernel, Linux PTP, snapd and a whole lot
more.
This week in Ubuntu Security Updates
56 unique CVEs addressed
[USN-6104-1] PostgreSQL vulnerabilities (00:55)
- 2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
- Two issues, both requiring to be an authenticated user. One in mishandling of
CREATE
privileges – could then allow an auth user to execute arbitrary code as
a the bootstrap supervisor – the other in row security properties which could
allow to bypass policies and get read/write contrary to security policy.
[USN-6105-1] ca-certificates update (01:32)
- Affecting Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
- Updates to the latest upstream 2.60 release from Mozilla, adds a bunch of new
CAs plus removes some that had either expired or that were now not used
anymore
[USN-6106-1] calamares-settings-ubuntu vulnerability (02:08)
- Affecting Jammy (22.04 LTS)
- When installing Lubuntu, it would allow to create the first user with an empty
password. Lubuntu uses it’s own installer called Calamares – so this issue
only affects Lubuntu, not regular Ubuntu or other Ubuntu flavors.
[USN-6100-1] HTML::StripScripts vulnerability (02:58)
- 1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
- REDoS when parsing HTML with “certain style attributes”
[USN-6108-1] Jhead vulnerabilities (03:18)
- 2 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
- [USN-6098-1] Jhead vulnerabilities in last week’s episode
- Code-exec – place OS commands into a JPEG filename and then using
jhead to rotate the file - Buffer overflow when writing Exif data
[USN-6110-1] Jhead vulnerabilities
- 3 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
- Stack buffer overflow, heap buffer overflow and OOB read – DoS / code exec
[USN-6113-1] Jhead vulnerability
- 1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
- Heap buffer OOB read -> DoS
[USN-6054-2] Django vulnerability (04:17)
- 1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM)
- [USN-6054-1] Django vulnerability in Episode 194
[USN-6109-1, USN-6118-1] Linux kernel (Raspberry Pi + Oracle) vulnerabilities (04:29)
- 8 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
- 5.4 raspi + oracle on both 20.04 + 18.04
- Most issues covered on previous episodes
[USN-6122-1] Linux kernel (OEM) vulnerabilities (04:49)
- 2 CVEs addressed in Jammy (22.04 LTS)
- 6.1 OEM 22.04 LTS
- Race condition in netfilter able to be triggered by a local user -> UAF
- requires
CAP_NET_ADMIN
but can get this in an unprivileged user namespace ∴
can be triggered OOTB by an unpriv user on Ubuntu - PoC was published for this last week – caused a bunch of folks to get
anxious but since can be mitigated by disabling unprivileged user namespaces
perhaps it was not worth all the hype? Also kernel updates take a while to
prepare and test etc so it is not easy to just drop everything and crank a
new kernel – so in general this would only occur for remotely exploitable
issues
- requires
[USN-6123-1] Linux kernel (OEM) vulnerabilities (06:48)
- 5 CVEs addressed in Jammy (22.04 LTS)
- 6.0 OEM
- Netfilter issue above, plus mishandling of control registers in nested KVM
VMs – could allow an guest VM to crash the VM host
[USN-6124-1] Linux kernel (OEM) vulnerabilities (07:10)
- 6 CVEs addressed in Jammy (22.04 LTS)
- 5.17 OEM
- Mostly same issues as above
[USN-6097-1] Linux PTP vulnerability (07:20)
- 1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS)
- Precision time protocol implementation – allows to synchronise time between
servers to sub-microsecond accuracy – more accurate than NTP – uses a
leader/follower architecture – leader would be synchronised with high accuracy
via say a GPS then distributes this to other machines via PTP - Failed to check length of received packet properly (but only for forwarded
packets) – results in a OOB R/W – so could either be an info leak or possible
RCE
[USN-6005-2] Sudo vulnerabilities (08:49)
- 2 CVEs addressed in Xenial ESM (16.04 ESM)
- [USN-6005-1] Sudo vulnerabilities in Episode 193
[USN-6111-1] Flask vulnerability (09:02)
- 1 CVEs addressed in Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
- Possibly sends a response intended for one client to a different client due to
mishandling of theVary:Cookie
header – requires the use of a caching proxy
and other conditions though so may not be a widespread issue
[USN-6112-1] Perl vulnerability (09:35)
- 1 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS)
- Failed to properly validate TLS certs when using CPAN with <:Tiny> to
download modules over HTTPS – failed to setssl_Verify
– parameter to
<:Tiny> - Seems the upstream HTTP::Tiny dev’s thinks it would be discriminatory to
enable SSL verification by default as that would make applications etc that
use self-signed certs or community-driven CAs like CAcert.org fail – but this
seems pretty outdated since with Let’s Encrypt etc nowadays there is easy
access to trusted certs for anyone – and so this just does a disservice to all
applications that use <:Tiny> making them potentially insecure
out-of-the-box - Won’t be surprised to see other similar vulns in the future as a result of
this foot-gun
[USN-6114-1] nth-check vulnerability (11:32)
- 1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS)
- Node.js module for parsing and compiling CSS nth-checks (used in CSS 3
nth-child()
andnth-last-of-type()
functions) – can pass it a string and it
will compile that to an optimised function for calling by other code - REDoS
[USN-6116-1] hawk vulnerability (12:11)
- 1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
- Node.js HTTP Holder-of-key authentication scheme – a HTTP authentication
scheme that is similar to the regular HTTP Digest scheme – developed by Mozilla - REDoS
[USN-6115-1] TeX Live vulnerability (12:47)
- 1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
- Shell command execution in luatex if run against an untrusted document since
could access the io stream used by the underlying lua engine and inject
contents into it which would then be executed
[USN-6119-1] OpenSSL vulnerabilities (13:20)
- 2 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
- CPU-based DoS when processing crafted ASN.1 object identifiers – requires to
have an object ID which itself is tens to hundreds of KBs – OpenSSL 3 has a
limit of 100KB on the peer cert chain which limits the ability to craft such
long IDs and have them be processed by OpenSSL - An aarch64 specific issue – AES-XTS decryption algorithm would possibly read
past the end of the input buffer -> OOB read -> possible DoS but only if the
ciphertext is a certain size relative to the block size
[USN-6120-1] SpiderMonkey vulnerabilities (14:25)
- 9 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
- mozjs 102.11 release – JS engine shipped in Firefox so has a lot of overlap
with CVEs in firefox etc. - thanks to the Jeremy Bicha on the Ubuntu Desktop team for preparing these
updates
[USN-6121-1] Nanopb vulnerabilities (14:45)
- 2 CVEs addressed in Focal (20.04 LTS)
- Implementation of Protocol Buffers but with small code size – designed for embedded systems etc
- Memory leak on parsing of crafted messages plus an invalid
free()
orrealloc()
on crafted messages – both only really an issue if parsing untrusted content
[USN-6117-1] Apache Batik vulnerabilities (15:16)
- 7 CVEs addressed in Trusty ESM (14.04 ESM), Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10)
- Java SVG library
- 4 different XSRF issues
- 1 SSRF issue on handling of URLs in Jar’s – could allow to access local files
on the server - 2 different issues that could allow untrusted Java code embedded in an SVG to
be executed
[USN-6125-1] snapd vulnerability (15:48)
- 1 CVEs addressed in Xenial ESM (16.04 ESM), Bionic (18.04 LTS), Focal (20.04 LTS), Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
- Very similar to a recent issue (CVE-2023-28100) in flatpak – seccomp sandbox failed to block
theTIOCLINUX
ioctl()
request – could allow a snap to inject contents into the
controlling terminal when run on a virtual console – this would then be
executed when the snap finished running -> code exec outside the snap sandbox - Now simply blocks
TIOCLINUX
as it already did forTIOCSTI
in the past - Very similar to historic
TIOCSTI
CVEs such as CVE-2016-9016 in firejail,
CVE-2016-10124 in lxc, CVE-2017-5226 in bubblewrap, CVE-2019-10063 in flatpak
[USN-6126-1] libvirt vulnerabilities (17:44)
- 2 CVEs addressed in Jammy (22.04 LTS), Kinetic (22.10), Lunar (23.04)
- race condition within the nwfilter driver – allows a local unprivileged user
to race against the driver and corrupt the list of network filters and trigger
a crash in the libvirt daemon - memory leak when reading SR-IOV PCI device capabilities
Goings on in Ubuntu Security Community
Ubuntu 18.04 has now entered ESM (18:21)
OpenPrinting tutorial on handling security bugs via GitHub (19:40)
- https://openprinting.github.io/OpenPrinting-News-May-2023/#handling-reported-security-bugs-with-github
- Last week we talked about a vulnerability in the cups-filter package
- Discusses the difficulty in handling security issues in open source projects,
where all the development is usually done in the open, how do you privately
report and collaborate on a security issue? - GitHub offers the ability to report security vulnerabilities privately
- Not enabled by default since it requires some configuration on the part of the
maintainer to configure the templates etc that get sent out – also needs the
organisation that owns the repo to enable this as well- GitHub offer some great guidance on the best ways to do this
- Usual workflow is to submit a report privately and then can create a temporary
private fork in which to develop the fix - Read Till’s blog post as that contains a great walk-through on how to enable
this
Get in contact
June 2, 2023
June 2, 2023
June 1, 2023
June 1, 2023
June 1, 2023
May 31, 2023
May 31, 2023
May 30, 2023
May 29, 2023
May 29, 2023
May 26, 2023
May 26, 2023
May 25, 2023
May 25, 2023
May 25, 2023
May 24, 2023
May 24, 2023
May 24, 2023
May 23, 2023
May 22, 2023
May 22, 2023
May 21, 2023
Search Results placeholder
Preparedness Podcasts
Podcasts – Practical Prepping
DAC – Apathy Has No Place Here! (Rant)
June 2, 2023
June 2, 2023
June 2, 2023
June 2, 2023
June 2, 2023
June 1, 2023
June 1, 2023
June 1, 2023
June 1, 2023
June 1, 2023
June 1, 2023
May 31, 2023
May 31, 2023
May 31, 2023
May 30, 2023
May 30, 2023
May 30, 2023
May 30, 2023
May 30, 2023
May 29, 2023
May 29, 2023
Search Results placeholder
