AOSC

 

Welcome to Anthon Open Source Community! We are a group of free and open technology enthusiasts working hard for improvements.

Most good programmers do programming not because they expect to get paid or get adulation by the public, but because it is fun to program. – Linus Torvalds

LATEST NEWS

  • New Tarball Releases!FEBRUARY 2, 2018

    A long over due batch of updates is now available for the AMD64 architecture, with a date of 20180128. With the last batch of tarballs released almost a year ago, this update should provide quite some convenience for new users, and old users trying to reinstall.


    plasma-20180128

    Finally, some new looks!


    Apart from updating the system releases, we have also made a series of changes to the tarballs - from how they were made, to the content of the tarballs:

    • All tarballs are now generated with Ciel, our in-house build environment manager. As compared to manual generation, like we did for the past three years, this method should create more consistent and sane tarballs.
    • All desktop-variant tarballs (GNOME, MATE, etc.) are now targeting a size of 2GiB, with the exception of ARMv7 and AArch64 (where space is expected to be more constrained). With the increased tarball size target, we have now pre-installed in addition LibreOffice, printing and scanning utilities, and a larger collection of fonts.
    • The tarballs no longer come with a default aosc user, or the users group occupying the 1000 UID and GID, respectively. You would have to create your own user, as discussed in the Wiki.
    • For AMD64 Linux Kernel and Intel Microcode are now updated and pre-installed to provide protection (mitigation) against the Meltdown and Spectre Vulnerabilities.

    In more detail, here are some of the changes we have made to specific variants:

    • Cinnamon has been updated to version 3.6.
    • GNOME has been updated to 3.26.2.
    • i3wm has slight visual make-over for the top panel and Conky.
    • KDE Frameworks have been updated to 5.41.0, while Plasma Desktop has been updated to 5.11.5, and KDE Applications to 17.08.3.
    • MATE Desktop has been updated to 1.18.2.

    You may ask, where is the variant for the Deepin Desktop Environment? We have decided not to ship this variant, as we recently discovered a “feature” in the DDE Daemon that changes the system GRUB (bootloader) theme without noticing the users. We are working on a method to remove or disable this feature by default, after which the tarballs could be generated with the next batch of updates.

    Speaking of the next batch, we do recognise that a year-long gap between updates has brought quite some inconvenience for new and old users a like - we do apologise for procrastinating. With automatic generation made available by Ciel, we are considering a fixed schedule for updating and releasing tarballs (say, monthly, or even weekly) to incorporate latest updates, bug fixes, and security updates. A news post will be made on this topic.


    As for other architectural ports of AOSC OS, we are still working on syncing package versions on these architectures, we are aiming for tarball releases in Mid-February.


    Thank you for choosing AOSC OS and we wish you enjoy the new releases!

  • Progress Report: AOSC OS, "Meltdown" and "Spectre"JANUARY 25, 2018

    Since our last progress report, the following progress has been accomplished in our effort to mitigate the “Meltdown” and “Spectre” vulnerabilities for our users:

    • Browsers. Chromium and Google Chrome 64 (64.0.3282.119), containing fixes for Spectre vulnerabilities, has been made available as a security update.
    • Virtualisation. VirtualBox 5.2.6, containing a fix for CVE-2017-5715, a variant of the Spectre vulnerabilities, has been made available as a security update.
    • Intel Microcode version 20180108 has been made available as a security update, however, it is warned by Intel that this update could lead to “unexpected reboots” on certain devices. We have decided to provide this update anyway, to make sure maximum patch availability for our users - though if you are encountering issues with this package, please uninstall intel-ucode. On the other hand, if you haven’t installed this package yet, please do so - though it should install automatically if you have boot-base installed.

    Please update your AOSC OS as soon as possible.

    — Mingcong Bai

  • Progress Report: AOSC OS, "Meltdown" and "Spectre"JANUARY 13, 2018

    Since our last progress report, the following progress has been accomplished in our effort to mitigate the “Meltdown” and “Spectre” vulnerabilities for our users:

    • Browsers. With the recently released WebKit2GTK+ 2.18.5, which addressed “Spectre”-related issues - at the present moment, it should be safe to use browsers and applications based on this engine: Midori, Epiphany (GNOME Web), Yelp (GNOME Help/Manual Browser), etc.
    • Microcode. Intel has released version 20180108 of their Microcode update package to further the mitigation of both vulnerabilities. However, there are reports announced by Lenovo and Intel regarding the update resulting in unexpected reboots. Please notify us if you encountered such issue.
    • Applications. Wireshark has recently released version 2.4.4 which mitigated one of the variants of “Spectre”, Kernel-Side Attack.

    Please update your AOSC OS as soon as possible.

    — Mingcong Bai

  • Core 5.1.1, "Meltdown", and "Spectre"JANUARY 10, 2018

    For the past several days we have been continuing our work on the mitigation of “Meltdown” and “Spectre” - though at this point, we are focusing on the latter.

    One of the more important progress is the release of AOSC OS Core 5.1.1, while containing some bugfixes and updates, comes with an updated GCC (GNU Compiler Collection) containing Clear Linux’s implementation/backport of Retpoline patch set to the 7.2 branch (which we are currently shipping). The patch set has the target to avoid “generating code which contains an indirect branch that could have its prediction poisoned by an attacker” - as described by an LLVM contributor. While it could take some serious reading to fully understand what is going on, this is a step towards a more complete mitigation of possible impacts of the “Spectre” vulnerability.

    Apart from that, we have the following updates since our last report:

    • Kernels. With the introduction of Retpoline patches to GCC, the 4.14 branch of Kernels (“Mainline” and “Libre”) has been rebulit with the patches from Clear Linux to include similar fixes in the Kernels. No patch had been made available for our 4.9 branch of Kernel yet.
    • NVIDIA. A new driver release, version 390.12 has been released to address the Spectre-related vulnerabilities. No statement from NVIDIA about the 340 branch for older cards has been issued, though question has been raised in the NVIDIA DevTalk Forum.

    That’s all for now. We’ll continue the progress reports in the coming weeks, possibly.

    — Mingcong Bai

  • Daily Progress Report: AOSC OS, "Meltdown" and "Spectre"JANUARY 7, 2018

    Here’s a follow up to yesterday’s Progress Report on the fixing of “Meltdown” and “Spectre” for AOSC OS. Several events have taken place in the past 24 hours:

    • Kernels. We have been able to produce and test both “LTS” and “Main” Kernels to address these security concerns. Please update to 4.9.75 (for “LTS”) and 4.14.12 (for “Main”) as soon as possible.
    • Browsers. A statement from our resident vulnerability tracker Zero King cited a link from Google Support:

    "Current stable versions of Chrome include an optional feature called Site Isolation which can be enabled to provide mitigation by isolating websites into separate address spaces. Learn more about Site Isolation and how to take action to enable it [from this link].

    “Chrome 64, due to be released on January 23, will contain mitigations to protect against exploitation.”

    At this moment, no other progress has been made on other issues stated on the last report.

    — Mingcong Bai

  • Progress Report: AOSC OS, "Meltdown" and "Spectre"

  • AOSC OS End-of-2017 Wave of Updates!

  • Today... Marks Our 6th Year!

  • Read more...

PROJECTS OVERVIEW

COMMON SERVICES

  • AOSC OS Packages

    A catalog of packages available for AOSC OS.

  • Community Repository

    Our community repository server, where AOSC OS installation medias, tarballs, packages, project documentation, etc. are stored.

  • Mirror Status

    Take a look at current mirror synchronization and availability information.

  • Mailing Lists

    Community mailing lists for discussions, advisories, and announcements.

  • IRC Channel

    Get in touch with the community.

  • Google+

    Learn about newest news and happenings in and around AOSC.

  • Hermes WebMail

    Our WebMail service for AOSC developers and contributors.

  • Public Clipboard

    Our public clipboard service (or pastebin) that you can use for all your clippy needs.