NEWS

Read hard, get it all caught up :-D

Things are (actually) going on around the community (surprise!), you may find latest news and happenings in and around the community, and of course, latest information for you to better enjoy AOSC OS.

Most good programmers do programming not because they expect to get paid or get adulation by the public, but because it is fun to program. – Linus Torvalds

ALL NEWS

  • AOSA-2017-0031: Update FirefoxMARCH 29, 2017

  • New package additions: Mar 5th, 2017MARCH 5, 2017

    Per users’ requests, we have added a total of 169 packages to our community repository between today and our last new packages report (Feb. 6th, 2017).

    Some highlights include:

    • MXNET, Flexible and Efficient Library for Deep Learning.
    • Powerline, A statusline plugin for various editors, shells, and desktops.
    • QTractor, Audio/MIDI multi-track sequencer application written in C++ with the Qt framework.
    • Sagemath, a integrated mathematics software system.
    • SciPy, Open-source software for mathematics, science, and engineering.
    • Tensorflow, Computation using data flow graphs for scalable machine learning.
    • Torch7, A scientific computing framework for LuaJIT.

    A full list of packages added this time could be found here.


    To learn about how to request new packages for addition into our community repository, please check out our “pakreq” guide. Or simply shout out requests with #pakreq hashtag on our #aosc IRC channel, or on our Telegram group (joining information available on IRC).

  • Spring Distribution Updates!MARCH 4, 2017

    Another batch of tarballs are now available for AOSC OS, available to users of the AMD64, ARMv7, ARMv8/AArch64, PowerPC 32/64-bit Big Endian ports. As usual, they contain the newest packages available for AOSC OS, along with some enhancements, changes, and additions:

    • New variants, Budgie and i3wm.
    • The root user is now locked down by default, but you may still enable the root user by setting a password for root, check out our new installation guide for more information.
    • AMD Ryzen support is available (Kernel 4.9.11).

    Here below is the default look to the AOSC OS i3wm variant, powered by the i3 window manager, Conky, and i3blocks - a configuration based on Manjaro’s i3 edition. This is our first i3wm distribution, so this release may still contain some inconsistency and shortcomings in design - tell us what you think!

    i3wm-desktop

    Budgie, the “flagship” desktop environment of the Solus Project - this is their own take on the GNOME desktop experience.

    budgie-desktop

    Neofetch is now installed with every AOSC OS distribution to provide you with some basic system information - and a chance to show off your distro!

    neofetch


    You might have noticed that tarballs for MIPS32 are not updated yet, this is because we are currently working on the Kernel port for MIPS32 - and it didn’t happen in time for this wave of updates - we will be releasing updates for MIPS32, along with MIPS64, with full mainline Kernel support on Loongson 2E, 2F, and 3A devices - as they are currently our principle target platform for these two ports (having said that, our MIPS ports are still generic and not specific to Loongson/Godson systems).


    Thanks for stopping by, and we wish you a good experience working with AOSC OS!

  • AOSA-2017-0030: Update cURLMARCH 4, 2017

    Please update your curl and curl+32 package to version 7.53.0.

    A recently released update to cURL has addressed a security vulnerability:

    curl and libcurl support “OCSP stapling”, also known as the TLS Certificate Status Request extension (using the CURLOPT_SSL_VERIFYSTATU option). When telling curl to use this feature, it uses that TLS extension to ask for a fresh proof of the server’s certificate’s validity. If the server doesn’t support the extension, or fails to provide said proof, curl is expected to return an error.

    Due to a coding mistake, the code that checks for a test success or failure, ends up always thinking there’s valid proof, even when there is none or if the server doesn’t support the TLS extension in question. Contrary to how it used to function and contrary to how this feature is documented to work.

    This could lead to users not detecting when a server’s certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality.

    And was assigned CVE-2017-2629.

    Relevant documentation:

  • AOSA-2017-0029: Update Util-LinuxMARCH 4, 2017

    Please update your util-linux package to version 2.29.2.

    A recently released update to Util-Linux has address a security vulnerability, assigned with CVE-2017-2616.

    It is possible for any local user to send SIGKILL to other processes with root privileges. To exploit this, the user must be able to perform su with a successful login. SIGKILL can only be sent to processes which were executed after the su process. It is not possible to send SIGKILL to processes which were already running.

    Relevant documentation:

  • AOSA-2017-0028: Update Linux KernelMARCH 4, 2017

    Please update your linux+kernel to versionf 69.

    A security vulnerability was disclosed for the Linux Kernel:

    This is an announcement about CVE-2017-6074 [1] which is a double-free vulnerability I found in the Linux kernel. It can be exploited to gain kernel code execution from an unprivileged processes.

    The oldest version that was checked is 2.6.18 (Sep 2006), which is vulnerable. However, the bug was introduced before that, probably in the first release with DCCP support (2.6.14, Oct 2005).

    The kernel needs to be built with CONFIG_IP_DCCP for the vulnerability to be present. A lot of modern distributions enable this option by default.

    And was assigned CVE-2017-6074.

    Relevant documentation:

  • AOSA-2017-0027: Update NTFS-3GMARCH 4, 2017

    Please update your ntfs-3g package to version 2016.2.22-1.

    A security vulnerability assigned with CVE-2017-0358 was addressed in NTFS-3G.

    *Jann Horn, Project Zero (Google) discovered that ntfs-3g, a read-write NTFS driver for FUSE does not not scrub the environment before executing modprobe to load the fuse module. This influence the behavior of modprobe (MODPROBE_OPTIONS environment variable, --config and –dirname options) potentially allowing for local root privilege escalation if ntfs-3g is installed setuid. This is the case for Debian, Ubuntu and probably Gentoo. *

    Relevant documentation:

  • AOSA-2017-0026: Update libopusMARCH 4, 2017

    Please update your libopus to version 1.1.4.

    A recently released update to libopus has fixed a security vulnerabilities, assigned CVE-2017-0381.

    Relevant documentation:

  • AOSA-2017-0025: Update Gtk-VNCMARCH 4, 2017

    Please update your gtk-vnc to version 0.7.0.

    A recently released update to Gtk-VNC has fixed a series of security vulnerabilities, assigned CVE-2017-5884, CVE-2017-5885.

    Relevant documentation:

  • AOSA-2017-0024: Update LibWMFMARCH 4, 2017

    Please update your libwmf package to version 0.2.8.4-5.

    A series of vulnerabilities were recently fixed in LibWMF, assigned CVE-2016-6912, CVE-2016-9317, CVE-2016-10166, CVE-2016-10167, CVE-2016-10168.

    Relevant documentation: