Read hard, get it all caught up :-D

Things are (actually) going on around the community (surprise!), you may find latest news and happenings in and around the community, and of course, latest information for you to better enjoy AOSC OS.

Most good programmers do programming not because they expect to get paid or get adulation by the public, but because it is fun to program. – Linus Torvalds


  • AOSA-2017-0040: Update to Chromium and Google ChromeJUNE 7, 2017

    Please update your google-chrome (amd64 only) and chromium packages to version 59.0.3071.86.

    A recently released version of Chromium and Google Chrome has addressed a series of security vulnerabilities, assigned with the following CVE IDs:

    CVE-2017-5070, CVE-2017-5071, CVE-2017-5072, CVE-2017-5073, CVE-2017-5074, CVE-2017-5075, CVE-2017-5076, CVE-2017-5077, CVE-2017-5078, CVE-2017-5079, CVE-2017-5080, CVE-2017-5081, CVE-2017-5082, CVE-2017-5083, CVE-2017-5085, CVE-2017-5086.

    Relevant documentation:

  • AOSA-2017-0039: Update SudoMAY 31, 2017

    Please update your sudo package to version 1.8.20p1.

    A recently released version of Sudo has addressed a security vulnerability titled “Potential overwrite of arbitrary files on Linux”:

    “On Linux systems, sudo parses the /proc/[pid]/stat file to determine the device number of the process’s tty (field 7). The fields in the file are space-delimited, but it is possible for the command name (field 2) to include spaces, which sudo does not account for. A user with sudo privileges can cause sudo to use a device number of the user’s choosing by creating a symbolic link from the sudo binary to a name that contains a space, followed by a number.”

    This vulnerability has been assigned CVE-2017-100036.

    Relevant documentation:

  • Cinnamon 3.4 Now Available!MAY 5, 2017

    Just a quick notice that Cinnamon 3.4 is now available in our community repository (along with the new Slick Greeter)! Here’s a screenshot…


    For more information on changes introduced with Cinnamon 3.4 please refer to this Linux Mint blog post.

  • AOSA-2017-0038: Update WeeChatMAY 5, 2017

    Please update your weechat package to version 1.7.1.

    A recently announced version of WeeChat has addressed the following security vulnerability:


    Relevant documentation:

  • Updates to Our Community Infrastructure!APRIL 29, 2017

    With the hard work of our community infrastructure contributors, there are now two more services available for our community members:

    • AOSC OS Packages: A catalog of packages available for AOSC OS.
    • Mailing Lists: Community mailing lists for discussions, advisories, and announcements.

    AOSC OS Packages

    Thanks to Dingyuan Wang (gumblex) for creating this website.

    It should not take much explanation for our Packages site - as mentioned above, it is a catalog of AOSC OS packages - and you could now search for a particular package available to AOSC OS (or to find out if it’s available yet), check on update status, and compare versions of a given package available to all our AOSC OS ports.

    Dingyuan Wang also mentioned that there will be a function where AOSC OS users could file package requests on the same website, making it easier for users and developers to check on request status.

    Mailing Lists

    Thanks to Sijie Bu (butangmucat) for making this service available.

    Currently there are four mailing lists available, each dedicated to different functions…

    • for community events and project-related announcements; broadcast only, read-only to subscribers.
    • for development discussions, questions, and suggestions; open to users and developers, subscription required.
    • announcements on maintenance and status of our mirrors; broadcast only, read-only to subscribers.
    • bulletin for security updates, CVEs, etc; broadcast only, read-only to subscribers.

    If you have any questions, concerns, or suggestions to our community services and infrastructure, please pop a mail to our discussions mailing list

  • AOSA-2017-0037: Update FirefoxAPRIL 28, 2017

  • AOSA-2017-0036: Update Chromium and Google ChromeAPRIL 28, 2017

    Please update your chromium and google-chrome packages to version 58.0.3029.81 and above.

    A recently released version of Chromium/Google Chrome Web browser addressed the following security issues, assigned with multiple CVE IDs:

    CVE-2017-5057, CVE-2017-5058, CVE-2017-5059, CVE-2017-5060, CVE-2017-5061, CVE-2017-5062, CVE-2017-5063, CVE-2017-5064, CVE-2017-5065, CVE-2017-5066, CVE-2017-5067, CVE-2017-5069.

    Relevant documentation:

  • AOSA-2017-0035: Update cURLAPRIL 28, 2017

    Please update your curl and curl+32 package to version 7.54.0 and above.

    A recently released version of cURL fixed several security vulnerabilities, one of which assigned with a CVE number:


    Relevant documentation:

  • Additional Information for AOSA-2017-0034APRIL 20, 2017

    We have received complaints regarding their SSH Host keys being erased despite that they have already regenerated their SSH Host key before AOSA-2017-0034 was posted.

    This is our fault for not checking on vulnerable host keys by checksum - instead, we chose to regenerate the keys regardless. But here’s the way to workaround this issue, issue this command before you upgrade your system (given that your openssh package has version older than 7.5p1-1).

    # touch /usr/share/doc/openssh/AOSA-2017-0034

    Again, we apologize for this incident.

  • AOSA-2017-0034: OpenSSH in Tarballs Shipped Identical Host KeysAPRIL 18, 2017

    This is an issue of great emergency, please update your system with the newest openssh package to workaround this security vulnerability!

    In our traditional way of generating AOSC OS release tarballs, SSH Daemon host keys were generated only once across any AOSC OS install because the tarballs were built from a single stub tarball, then to a Base variant - which already contains a copy of OpenSSH (with keys generated) - then all other variants were generated from the Base tarball with extra sets of packages. The result was - due to our ignorance - that all SSH Daemon host keys are generated only once, a great security threat to all AOSC OS users with their SSH Daemon or sshd.service enabled.

    To workaround this for all existing users, (once again) please update your system with the latest openssh package, if you see the following message when installing the update…

    Regenerating SSH Keys for AOSA-2017-0034...
    removed '/etc/ssh/ssh_host_dsa_key'
    removed '/etc/ssh/'
    removed '/etc/ssh/ssh_host_ecdsa_key'
    removed '/etc/ssh/'
    removed '/etc/ssh/ssh_host_ed25519_key'
    removed '/etc/ssh/'
    removed '/etc/ssh/ssh_host_rsa_key'
    ssh-keygen: generating new host keys: RSA DSA ECDSA ED25519

    Then your SSH Daemon host keys are regenerated, and they are expected to be unique across any device. You would not need to restart your sshd.service, but when clients connect to your device, they may receive a warning…

    Someone could be eavesdropping on you right now (man-in-the-middle attack)!
    It is also possible that a host key has just been changed.
    The fingerprint for the ECDSA key sent by the remote host is
    <ECSDA key here>
    Please contact your system administrator.

    Please remove the line (or inform users of your AOSC OS host with SSH enabled to do so) from your ~/.ssh/known_host file containing the key described above - another method is to identify the host you are attempting to connect to, and remove the line containing the host.

    Updates to openssh are now available for amd64, arm64, armel, mipsel, powerpc, and ppc64.