<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 04 Apr 2026 12:35:46 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Linux Action News - Episodes Tagged with “Ars Technica”</title>
    <link>https://linuxactionnews.com/tags/ars%20technica</link>
    <pubDate>Sun, 31 Jan 2021 15:15:00 -0800</pubDate>
    <description>Weekly Linux news and analysis by Chris and Wes. The show every week we hope you'll go to when you want to hear an informed discussion about what’s happening.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Our weekly take on the free and open source world.</itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Weekly Linux news and analysis by Chris and Wes. The show every week we hope you'll go to when you want to hear an informed discussion about what’s happening.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/d/dec90738-e640-45e5-b375-4573052f4bf4/cover.jpg?v=6"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Linux Action News 174</title>
  <link>https://linuxactionnews.com/174</link>
  <guid isPermaLink="false">5d0d1622-0de4-41b3-a017-5ace4c96156d</guid>
  <pubDate>Sun, 31 Jan 2021 15:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/dec90738-e640-45e5-b375-4573052f4bf4/5d0d1622-0de4-41b3-a017-5ace4c96156d.mp3" length="15053345" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Google removes Matrix chat-client Element from the Play store, sudo has a major flaw with a long-tail, and Rocky Linux gets a boost.</itunes:subtitle>
  <itunes:duration>20:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/d/dec90738-e640-45e5-b375-4573052f4bf4/cover.jpg?v=6"/>
  <description>Google removes Matrix chat-client Element from the Play store, sudo has a major flaw with a long-tail, and Rocky Linux gets a boost. 
</description>
  <itunes:keywords>Linux News Podcast, Linux Action News, Matrix, Element, federated chat, Play Store, App Store, Telegram, Robinhood, wallstreetbets, GameStop, Google, sudo, security, vulnerability, CVE-2021-3156, Baron Samedit, root, software bug, Qualys, Debian, Ubuntu, Fedora, bleepingcomputer, Rocky Linux, CentOS, Gregory Kurtzer, Ctrl IQ, CloudLinux, AlmaLinux, HPC, Jim Salter, Ars Technica, AWS, Mattermost, The Register, Red Hat, AlmaLinux, Brian Exelbierd, Greg Kroah-Hartman, Linux 5.10, Broadcam, Scott Branden, LTS, Samsung,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Google removes Matrix chat-client Element from the Play store, sudo has a major flaw with a long-tail, and Rocky Linux gets a boost.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://linode.com/lan">Linode</a>: <a rel="nofollow" href="http://linode.com/lan">Sign up using the link on this page and receive a $100 60-day credit towards your new account. </a></li></ul><p><a rel="payment" href="https://www.jupiter.party/">Support Linux Action News</a></p><p>Links:</p><ul><li><a title="Element suspended on Google Play Store" rel="nofollow" href="https://element.io/blog/element-on-google-play-store/">Element suspended on Google Play Store</a> &mdash; At 2021-01-29 at 21:35 UTC Google suspended Element from the Play Store without warning or notification</li><li><a title="Element sees fivefold increase in signups after Whatsapp privacy debacle" rel="nofollow" href="https://sifted.eu/articles/element-whatsapp-exodus/">Element sees fivefold increase in signups after Whatsapp privacy debacle</a> &mdash; After Whatsapp’s announcement, rival app Telegram reported a 500% increase in users and Signal saw an 18-fold increase in download numbers, putting it on track to cross 1m new users each day. </li><li><a title="Element team waiting hours" rel="nofollow" href="https://twitter.com/element_hq/status/1355595359582638080">Element team waiting hours</a> &mdash; Update: we’re still waiting for a response from Google to our explanatory mail sent ~8 hours ago. Thanks all for your patience while we get this sorted...</li><li><a title="New Linux SUDO flaw lets local users gain root privileges" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/new-linux-sudo-flaw-lets-local-users-gain-root-privileges/">New Linux SUDO flaw lets local users gain root privileges</a> &mdash; The issue is a heap-based buffer overflow exploitable by any local user (normal users and system users, listed in the sudoers file or not), with attackers not being required to know the user's password to successfully exploit the flaw. The vulnerability was introduced in the Sudo program almost 9 years ago, in July 2011.</li><li><a title="10-year-old Sudo bug lets Linux users gain root-level access" rel="nofollow" href="https://www.zdnet.com/article/10-years-old-sudo-bug-lets-linux-users-gain-root-level-access/">10-year-old Sudo bug lets Linux users gain root-level access</a></li><li><a title="Buffer overflow in command line unescaping" rel="nofollow" href="https://www.sudo.ws/alerts/unescape_overflow.html">Buffer overflow in command line unescaping</a></li><li><a title="Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156) - Help Net Security" rel="nofollow" href="https://www.helpnetsecurity.com/2021/01/27/cve-2021-3156/">Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156) - Help Net Security</a> &mdash; "This vulnerability is perhaps the most significant sudo vulnerability in recent memory (both in terms of scope and impact) and has been hiding in plain sight for nearly 10 years."
</li><li><a title="New Linux Kernel Vulnerabilities Patched in All Supported Ubuntu Releases" rel="nofollow" href="https://9to5linux.com/new-linux-kernel-vulnerabilities-patched-in-all-supported-ubuntu-releases">New Linux Kernel Vulnerabilities Patched in All Supported Ubuntu Releases</a></li><li><a title="Mitre - CVE-2020-28374" rel="nofollow" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374">Mitre - CVE-2020-28374</a></li><li><a title="Red Hat Customer Portal: CVE-2020-28374" rel="nofollow" href="https://access.redhat.com/security/cve/cve-2020-28374">Red Hat Customer Portal: CVE-2020-28374</a></li><li><a title="Debian: CVE-2020-28374" rel="nofollow" href="https://security-tracker.debian.org/tracker/CVE-2020-28374">Debian: CVE-2020-28374</a></li><li><a title=" Ubuntu: CVE-2020-28374" rel="nofollow" href="https://ubuntu.com/security/CVE-2020-28374"> Ubuntu: CVE-2020-28374</a></li><li><a title="The killing of CentOS Linux: ‘The CentOS board doesn’t get to decide what Red Hat engineering teams do’" rel="nofollow" href="https://www.theregister.com/2021/01/26/killing_centos/">The killing of CentOS Linux: ‘The CentOS board doesn’t get to decide what Red Hat engineering teams do’</a> &mdash; Brian Exelbierd, responsible for Red Hat liaison with the CentOS project and a board member of that project, has told The Register that CentOS Linux is ending because Red Hat simply refused to invest in it.

</li><li><a title="Rocky Linux gets a new sponsor—Gregory Kurtzer’s startup, Ctrl IQ" rel="nofollow" href="https://arstechnica.com/gadgets/2021/01/rocky-linux-gets-a-parent-company-with-4m-series-a-funding/">Rocky Linux gets a new sponsor—Gregory Kurtzer’s startup, Ctrl IQ</a> &mdash; Rocky Linux is to be a beneficiary of Ctrl IQ's revenue, not its source—the company describes itself in its announcement as the suppliers of a "full technology stack integrating key capabilities of enterprise, hyper-scale, cloud and high-performance computing."</li><li><a title="Linux maintainer says long-term support for 5.10 will stay at two years unless biz world steps up and actually uses it" rel="nofollow" href="https://www.theregister.com/2021/01/28/long_term_support_for_linux_510/">Linux maintainer says long-term support for 5.10 will stay at two years unless biz world steps up and actually uses it</a> &mdash; Linux kernel maintainer Greg Kroah-Hartman has responded to complaints that the current promise of two years for 5.10 is not enough, explaining that support is not automatic but requires commercial help.
</li><li><a title="Rust Game Server One-Click App Linode" rel="nofollow" href="https://www.linode.com/marketplace/apps/linode/rust-game-server/">Rust Game Server One-Click App Linode</a> &mdash; A free-for-all battle in a harsh open-world environment.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Google removes Matrix chat-client Element from the Play store, sudo has a major flaw with a long-tail, and Rocky Linux gets a boost.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://linode.com/lan">Linode</a>: <a rel="nofollow" href="http://linode.com/lan">Sign up using the link on this page and receive a $100 60-day credit towards your new account. </a></li></ul><p><a rel="payment" href="https://www.jupiter.party/">Support Linux Action News</a></p><p>Links:</p><ul><li><a title="Element suspended on Google Play Store" rel="nofollow" href="https://element.io/blog/element-on-google-play-store/">Element suspended on Google Play Store</a> &mdash; At 2021-01-29 at 21:35 UTC Google suspended Element from the Play Store without warning or notification</li><li><a title="Element sees fivefold increase in signups after Whatsapp privacy debacle" rel="nofollow" href="https://sifted.eu/articles/element-whatsapp-exodus/">Element sees fivefold increase in signups after Whatsapp privacy debacle</a> &mdash; After Whatsapp’s announcement, rival app Telegram reported a 500% increase in users and Signal saw an 18-fold increase in download numbers, putting it on track to cross 1m new users each day. </li><li><a title="Element team waiting hours" rel="nofollow" href="https://twitter.com/element_hq/status/1355595359582638080">Element team waiting hours</a> &mdash; Update: we’re still waiting for a response from Google to our explanatory mail sent ~8 hours ago. Thanks all for your patience while we get this sorted...</li><li><a title="New Linux SUDO flaw lets local users gain root privileges" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/new-linux-sudo-flaw-lets-local-users-gain-root-privileges/">New Linux SUDO flaw lets local users gain root privileges</a> &mdash; The issue is a heap-based buffer overflow exploitable by any local user (normal users and system users, listed in the sudoers file or not), with attackers not being required to know the user's password to successfully exploit the flaw. The vulnerability was introduced in the Sudo program almost 9 years ago, in July 2011.</li><li><a title="10-year-old Sudo bug lets Linux users gain root-level access" rel="nofollow" href="https://www.zdnet.com/article/10-years-old-sudo-bug-lets-linux-users-gain-root-level-access/">10-year-old Sudo bug lets Linux users gain root-level access</a></li><li><a title="Buffer overflow in command line unescaping" rel="nofollow" href="https://www.sudo.ws/alerts/unescape_overflow.html">Buffer overflow in command line unescaping</a></li><li><a title="Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156) - Help Net Security" rel="nofollow" href="https://www.helpnetsecurity.com/2021/01/27/cve-2021-3156/">Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156) - Help Net Security</a> &mdash; "This vulnerability is perhaps the most significant sudo vulnerability in recent memory (both in terms of scope and impact) and has been hiding in plain sight for nearly 10 years."
</li><li><a title="New Linux Kernel Vulnerabilities Patched in All Supported Ubuntu Releases" rel="nofollow" href="https://9to5linux.com/new-linux-kernel-vulnerabilities-patched-in-all-supported-ubuntu-releases">New Linux Kernel Vulnerabilities Patched in All Supported Ubuntu Releases</a></li><li><a title="Mitre - CVE-2020-28374" rel="nofollow" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374">Mitre - CVE-2020-28374</a></li><li><a title="Red Hat Customer Portal: CVE-2020-28374" rel="nofollow" href="https://access.redhat.com/security/cve/cve-2020-28374">Red Hat Customer Portal: CVE-2020-28374</a></li><li><a title="Debian: CVE-2020-28374" rel="nofollow" href="https://security-tracker.debian.org/tracker/CVE-2020-28374">Debian: CVE-2020-28374</a></li><li><a title=" Ubuntu: CVE-2020-28374" rel="nofollow" href="https://ubuntu.com/security/CVE-2020-28374"> Ubuntu: CVE-2020-28374</a></li><li><a title="The killing of CentOS Linux: ‘The CentOS board doesn’t get to decide what Red Hat engineering teams do’" rel="nofollow" href="https://www.theregister.com/2021/01/26/killing_centos/">The killing of CentOS Linux: ‘The CentOS board doesn’t get to decide what Red Hat engineering teams do’</a> &mdash; Brian Exelbierd, responsible for Red Hat liaison with the CentOS project and a board member of that project, has told The Register that CentOS Linux is ending because Red Hat simply refused to invest in it.

</li><li><a title="Rocky Linux gets a new sponsor—Gregory Kurtzer’s startup, Ctrl IQ" rel="nofollow" href="https://arstechnica.com/gadgets/2021/01/rocky-linux-gets-a-parent-company-with-4m-series-a-funding/">Rocky Linux gets a new sponsor—Gregory Kurtzer’s startup, Ctrl IQ</a> &mdash; Rocky Linux is to be a beneficiary of Ctrl IQ's revenue, not its source—the company describes itself in its announcement as the suppliers of a "full technology stack integrating key capabilities of enterprise, hyper-scale, cloud and high-performance computing."</li><li><a title="Linux maintainer says long-term support for 5.10 will stay at two years unless biz world steps up and actually uses it" rel="nofollow" href="https://www.theregister.com/2021/01/28/long_term_support_for_linux_510/">Linux maintainer says long-term support for 5.10 will stay at two years unless biz world steps up and actually uses it</a> &mdash; Linux kernel maintainer Greg Kroah-Hartman has responded to complaints that the current promise of two years for 5.10 is not enough, explaining that support is not automatic but requires commercial help.
</li><li><a title="Rust Game Server One-Click App Linode" rel="nofollow" href="https://www.linode.com/marketplace/apps/linode/rust-game-server/">Rust Game Server One-Click App Linode</a> &mdash; A free-for-all battle in a harsh open-world environment.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
