<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Linux on XtraLinux</title>
    <link>https://xtralinux.pages.dev/en/tags/linux/</link>
    <description>Recent content in Linux on XtraLinux</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sat, 27 Apr 2024 18:44:55 +0200</lastBuildDate>
    <atom:link href="https://xtralinux.pages.dev/en/tags/linux/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Canonical Releases Ubuntu 24.04 Noble Numbat</title>
      <link>https://xtralinux.pages.dev/en/news/canonical-releases-ubuntu-24-04-noble-numbat/</link>
      <pubDate>Sat, 27 Apr 2024 18:44:55 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/canonical-releases-ubuntu-24-04-noble-numbat/</guid>
      <description>&lt;p&gt;Today Canonical announced the release of Ubuntu 24.04 LTS, codenamed &amp;ldquo;Noble Numbat&amp;rdquo;, available to download and install from &lt;a href=&#34;https://ubuntu.com/download&#34;&gt;https://ubuntu.com/download&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://ubuntu.com//blog/canonical-releases-ubuntu-24-04-noble-numbat&#34;&gt;Source ubuntu.com&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ubuntu 24.10 and Debian 13 Trixie to Feature New CLI</title>
      <link>https://xtralinux.pages.dev/en/news/ubuntu-24-10-and-debian-13-trixie-to-feature-new-cli/</link>
      <pubDate>Sun, 14 Apr 2024 17:02:02 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/ubuntu-24-10-and-debian-13-trixie-to-feature-new-cli/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; Ubuntu 24.10 and Debian Trixie Are Getting a Refined APT Command-Line Interface&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;The APT 3.0 package manager is getting a completely revamped UI with columnar display, support for colors, and much more.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://9to5linux.com/ubuntu-24-10-and-debian-13-trixie-to-feature-a-refined-command-line-interface&#34;&gt;Source&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>How to Harden OpenSSH on Ubuntu 20.04</title>
      <link>https://xtralinux.pages.dev/en/docs/how-to-harden-openssh-on-ubuntu-2004/</link>
      <pubDate>Thu, 11 Apr 2024 22:52:42 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/docs/how-to-harden-openssh-on-ubuntu-2004/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; Hardening Your OpenSSH Server on Ubuntu 20.04&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;This tutorial focuses on enhancing the security of your OpenSSH server on Ubuntu 20.04 by implementing various hardening configurations. It begins with a general overview of SSH server administration and emphasizes the importance of securing the server as it serves as the primary entry point into your system.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.digitalocean.com/community/tutorials/how-to-harden-openssh-on-ubuntu-20-04&#34;&gt;Source&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2024-3094: Critical RCE Vulnerability in XZ Utils</title>
      <link>https://xtralinux.pages.dev/en/news/cve-2024-3094-critical-rce-vulnerability-xz-utils/</link>
      <pubDate>Thu, 11 Apr 2024 22:36:07 +0200</pubDate>
      <guid>https://xtralinux.pages.dev/en/news/cve-2024-3094-critical-rce-vulnerability-xz-utils/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Title:&lt;/strong&gt; CVE-2024-3094: Critical RCE Vulnerability Found in XZ Utils&lt;/p&gt;&#xA;&lt;p&gt;&lt;strong&gt;Summary:&lt;/strong&gt;&#xA;A critical supply chain compromise, CVE-2024-3094, has been detected in XZ Utils Data compression library versions 5.6.0 and 5.6.1. This vulnerability may lead to Remote Code Execution (RCE) via SSH authentication in specific versions of certain Linux distributions.&lt;/p&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils&#34;&gt;Source&lt;/a&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
