~xnox/ubuntu/+source/linux-snap/+git/bionic:master

Last commit made on 2019-08-06
Get this branch:
git clone -b master https://git.launchpad.net/~xnox/ubuntu/+source/linux-snap/+git/bionic
Only Dimitri John Ledkov can upload to this branch. If you are Dimitri John Ledkov please log in for upload directions.

Branch merges

Branch information

Recent commits

d26734a... by Dimitri John Ledkov

Pin any PPAs to the same priority as -updates.

PPAs only have "release" pocket, and do not have -updates, thus at the
moment they get pinned down lower than -updates. Normally, the
snappy-dev/image ppa should be treated on the same priority as
-updates.

Signed-off-by: Dimitri John Ledkov <email address hidden>

c701aea... by Dimitri John Ledkov

sigh

06de5e9... by Dimitri John Ledkov

copy all keys

edd1f89... by Paolo Pisati

Initrd modules: fbdev/hdmi out support for psplash

BugLink: https://launchpad.net/bugs/1837209

Signed-off-by: Paolo Pisati <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Brad Figg <email address hidden>

b73543e... by Stefan Bader

Run one update after debootstrap

To add the key we need to install gnupg but we cannot do that
after copying in the external sources.list (which contains the
other archive already). So do one unmodified update run.

Signed-off-by: Stefan Bader <email address hidden>

7f24249... by Stefan Bader

Fix build with snap source already there

Inject the snap key as soon as possible.

Signed-off-by: Stefan Bader <email address hidden>

ea01634... by Tyler Hicks

Use authenticated repositories and packages

BugLink: https://launchpad.net/bugs/1836041

Ensure that all of the additionally configured repositories and
installed packages needed to construct a kernel snap are authenticated
by apt.

The Makefile improperly used the --allow-insecure-repositories and
--allow-unauthenticated apt options when setting up the build chroot. An
attacker with control over the network between the build machine and the
Ubuntu archive or the snappy-dev/image PPA could use this to perform a
man-in-the-middle attack to install malicious packages in the build
chroot.

Such an attack is unlikely for the official Ubuntu kernel snap builds
since the Launchpad buildd infrastructure and the network communication
with the Ubuntu archive and Launchpad PPAs is tightly controlled.
However, end-users may use this Makefile to build their own kernel snaps
and have no guarantees about the communication with the archive or PPAs.

Store a copy of the snappy-dev/image PPA's public signing key alongside
the Makefile so that the public signing key can be added to apt as part
of the build process. Finally, remove all uses of
--allow-insecure-repositories and --allow-unauthenticated when invoking
apt commands.

CVE-2019-11480

Signed-off-by: Tyler Hicks <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Andy Whitcroft <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

bf65d87... by Paolo Pisati

deb to snap: enable arm64 for linux-pc-image

Signed-off-by: Paolo Pisati <email address hidden>

a19c827... by Paolo Pisati

deb to snap: enable armhf for linux-pc-image

Signed-off-by: Paolo Pisati <email address hidden>

ce46037... by Stefan Bader

Undo changes to avoid second apt update

We were missing the one line which adds another source
in all cases.

Signed-off-by: Stefan Bader <email address hidden>