Let us start with an apologize - we messed up. Starting with AOSC OS2 back in early 2014, the repositories for AOSC OS were signed with a GPG key - it was a time when we had no idea about longterm maintainership - thus no plan, nor anticipation for the expiration of this GPG key on Valentine's Day of 2017.
Although the problem has already been addressed for our source repository (with extra security enhancements), we do realize that some of you have already been running into issues trying to update your AOSC OS. It will be another two days before we could push out another batch of updates that addresses this issue directly - but you can still fix it yourself (albeit you can't even obtain an update for Apt now, as you can't update your system anyways). So here is how it goes:
First, obtain a copy of our new GPG key.
Then, remove the old key from the old storage.
sudo rm -fv /etc/apt/trusted.gpg
And finally, add the new key to the Apt key storage.
sudo apt-key add 20170214-2y.gpg
And you should be greeted with an "OK" message. Now, you are good to go again with the new keys on hand.
sudo apt update
But at the time of posting, you may not be able to update your system via our various mirrors, this is because our new signature was not yet synchronised with the mirrors. To workaround this issue temporarily, use
apt-gen-list and select our source server again - it might be slower in certain areas, but it gets the job done.
sudo apt-gen-list -e "40-source"
Then, as usual.
sudo apt update
Core 4.2 was just released as the latest feature update to the Core 4.0 series. With 4.2, we have updated virtually every single component in the Core, but more importantly, we have officially added support for the MIPS64 Little Endian architecture, currently maintained by Junde Yhi (creation of build specifications, and package porting) and Mingcong Bai (package porting).
What's more? You could expect, with Core 4.2:
Core 4.2 is now readily available for the AMD64/x86_64 port of AOSC OS, updates for all other architectures will come in this upcoming weekend.
Please note that Core 4.2 contains security updates, which were assigned with AOSA-2017-0018 (for GNU C Library) and AOSA-2017-0019 (for Bash). Please update your AOSC OS with the newest Core at your earliest convenience!
For detailed description of changes made between Core 4.1 and 4.2, please checkout the full changelog.
Please update your
bash package to version
At patch level 7, which would be version
4.4.7 of Bash, a security issue was addressed that:
"An exploit can be realized by creating a file or directory with a specially crafted name. A user utilizing GNU Bash’s built-in path completion by hitting the Tab button (f.e. to remove it with rm) triggers the exploit without executing a command itself. The vulnerability has been introduced on the devel-branch in May 2015."
And was consequently assigned CVE-2017-5932.
Please update your
glibc package to version
Two security vulnerabilities were addressed in the recently released GNU C Library, version 2.25:
Here's a quick introduction to a new series of posts regarding AOSC OS development updates over a period of time (per one to two months) - a brief description about what we have done while nothing was posted on the Portal, and a look into the next period of time - what would we do, and what could you expect from us.
January is a month when most of our developers took a break from busy school work (winter break, whee), and the month when time allows for major changes to AOSC OS. In the past month, we have updated some major components of AOSC OS, including Python 3.6, OpenMPI 2.0, and Boost 1.63. All of these changes will definitely improve performance, and making work easier for developers using AOSC OS. Do keep in mind that these update required an extensive amount of rebuild due to ABI/API incompatibilities introduced with new versions of these components - do expect hundreds to thousands of package updates, and (unfortunately) some bugs introduced by our oversight. If you did happen to bump into a friendly (or not so friendly) bug, do report it to us.
Progress was also made on the MIPS64 front, for which we have finished building a base system - it's ready to boot with full Systemd - when a Kernel is ready for Junde Yhi's Loongson 3A. But given time constraints in recent weeks, we could not guarantee a released tarball until summer break time (June, or July).
In the coming month, we will push out a new series of tarballs (system releases) for the spring, which of course, will include the newest packages we could offer for each of our AOSC OS ports. Also, we will make another attempt on pushing out Live system releases with a functional and graphical installation program.
On the question of ports, we are now armed with a bare-metal RISC-V rv32i toolchain, once we get our hands on a device, we should be able to start a new port (8th!) for AOSC OS - if not, we might have to start with RISC-V's official ISA emulator, Spike.
WSAOSC (Windows Subsystem for AOSC OS) will also start a complete rewrite, led by Yi Rong, the original creator of the old installer written in Go language. More details will be posted when development restarts.
And that's all for this issue of Dev. Update for AOSC OS, we will see you around in a bit. If you want to get in touch with us, please join our IRC channel at #aosc on irc.freenode.net.
Per users' requests, we have added the following packages to our community repository:
ariamaestosa- Midi sequencer/editor with a user-friendly interface.
avidemux- A simple free video editor.
binutils+cross-bm-rv32i- Binutils for RISC-V rv32i subset bare metal build.
dgsh- A Unix-style shell (based on bash) allowing the specification of pipelines with non-linear non-uniform operations.
dssi- API for audio processing plugins & softsynths with UIs.
dssi-vst- DSSI adapter for win32 VST plug-ins.
dunst- Customizable and lightweight notification-daemon.
elixir- A dynamic, functional meta-programming aware language.
epub2txt- Utility to extract and format text from EPUB documents.
etl- C++ STL complementory multiplatform template library.
fisherman- A plugin manager for the Fish shell.
flite- A lighweight speech synthesis engine.
gcc+cross-bm-rv32i- GCC for bare metal RISC-V rv32i build.
gnome-web-photo- Generate full-size image files and thumbnails from HTML files and web pages.
goocanvas-1- A cairo canvas widget for GTK+ (version 1).
grumpy- A Python to Go source code transcompiler and runtime.
kirigami2- A QtQuick-based component set (version 2).
lincity-ng- A city simulation game.
mapcrafter- High performance minecraft map renderer.
newlib+cross-bm-rv32i- newlib for RISC-V bare metal rv32i build.
perl-file-copy-recursive- Perl extension for recursively copying files and directories.
perl-gnome2- Perl binding for GNOME 2.
perl-gnome2-canvas- Perl binding for libgnomecanvas.
perl-gnome2-vfs- Perl binding for GNOME VFS.
perl-gnome2-wnck- Perl binding for Window Navigator Construction Kit (GNOME 2).
perl-goo-canvas- Perl binding for GooCanvas version 1.
perl-gtk2-appindicator- Perl extension for libappindicator.
perl-gtk2-imageview- Perl bindings to the GtkImageView image viewer widget.
perl-gtk2-unique- Perl binding for libunique.
perl-html-form- Class that represents an HTML form element.
perl-http-response-encoding- Adds encoding to HTTP::Response.
perl-http-server-simple- Lightweight HTTP server for Perl.
perl-proc-processtable- Provides a consistent interface to process table information.
perl-proc-simple- Launch and control background processes.
perl-sort-naturally- Sort lexically, but sort numeral parts numerically.
perl-www-mechanize- Automates web page form & link interaction.
perl-x11-protocol- Raw interface to X Window System servers.
perl-x11-protocol-other- Extra extesions for perl-x11-protocol
pngcrush- An optimizer for PNG files.
qtvirtualkeyboard- Qt virtual keyboard framework.
rosegarden- A music composition and editing environment.
schedtool- Query or alter a process' scheduling policy.
sdl-gfx- SDL Graphic Primitives.
shutter- A feature-rich screenshot tool.
synfig- Professional vector animation program (tools only).
zstd- Fast real-time compression algorithm.
To learn about how to request new packages for addition into our community repository, please check out our "pakreq" guide. Or simply shout out requests with
#pakreq hashtag on our #aosc IRC channel, or on our Telegram group (joining information available on IRC).
Please update your
tcpdump package to version
A recently released version of TCPDump has addressed the following security vulnerabilities:
CVE-2016-7922, CVE-2016-7923, CVE-2016-7924, CVE-2016-7925, CVE-2016-7926, CVE-2016-7927, CVE-2016-7928, CVE-2016-7929, CVE-2016-7930, CVE-2016-7931, CVE-2016-7932, CVE-2016-7933, CVE-2016-7934, CVE-2016-7935, CVE-2016-7936, CVE-2016-7937, CVE-2016-7938, CVE-2016-7939, CVE-2016-7940, CVE-2016-7973, CVE-2016-7974, CVE-2016-7975, CVE-2016-7983, CVE-2016-7984, CVE-2016-7985, CVE-2016-7986, CVE-2016-7992, CVE-2016-7993, CVE-2016-8574, CVE-2016-8575, CVE-2017-5202, CVE-2017-5203, CVE-2017-5204, CVE-2017-5205, CVE-2017-5341, CVE-2017-5342, CVE-2017-5482, CVE-2017-5483, CVE-2017-5484, CVE-2017-5485, CVE-2017-5486.
Please update your
google-chrome packages to version
Recently released Chromium and Google Chrome browsers have addressed the following security vulnerabilities:
CVE-2017-5006, CVE-2017-5007, CVE-2017-5008, CVE-2017-5009, CVE-2017-5010, CVE-2017-5011, CVE-2017-5012, CVE-2017-5013, CVE-2017-5014, CVE-2017-5015, CVE-2017-5016, CVE-2017-5017, CVE-2017-5018, CVE-2017-5019, CVE-2017-5020, CVE-2017-5021, CVE-2017-5022, CVE-2017-5023, CVE-2017-5024, CVE-2017-5025, CVE-2017-5026.