It was discovered that Schroot incorrectly handled certain Schroot names. An attacker could possibly use this issue to break schroot's internal state causing a denial of service.
{ "binaries": [ { "binary_name": "dchroot", "binary_version": "1.6.10-1ubuntu3+esm1" }, { "binary_name": "dchroot-dbgsym", "binary_version": "1.6.10-1ubuntu3+esm1" }, { "binary_name": "dchroot-dsa", "binary_version": "1.6.10-1ubuntu3+esm1" }, { "binary_name": "dchroot-dsa-dbgsym", "binary_version": "1.6.10-1ubuntu3+esm1" }, { "binary_name": "libsbuild-dev", "binary_version": "1.6.10-1ubuntu3+esm1" }, { "binary_name": "libsbuild-dev-dbgsym", "binary_version": "1.6.10-1ubuntu3+esm1" }, { "binary_name": "libsbuild-doc", "binary_version": "1.6.10-1ubuntu3+esm1" }, { "binary_name": "schroot", "binary_version": "1.6.10-1ubuntu3+esm1" }, { "binary_name": "schroot-common", "binary_version": "1.6.10-1ubuntu3+esm1" }, { "binary_name": "schroot-dbg", "binary_version": "1.6.10-1ubuntu3+esm1" }, { "binary_name": "schroot-dbgsym", "binary_version": "1.6.10-1ubuntu3+esm1" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "binaries": [ { "binary_name": "schroot", "binary_version": "1.6.10-4ubuntu0.1" }, { "binary_name": "schroot-common", "binary_version": "1.6.10-4ubuntu0.1" }, { "binary_name": "schroot-dbgsym", "binary_version": "1.6.10-4ubuntu0.1" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "schroot", "binary_version": "1.6.10-9ubuntu0.1" }, { "binary_name": "schroot-common", "binary_version": "1.6.10-9ubuntu0.1" }, { "binary_name": "schroot-dbgsym", "binary_version": "1.6.10-9ubuntu0.1" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "schroot", "binary_version": "1.6.10-12ubuntu3.1" }, { "binary_name": "schroot-common", "binary_version": "1.6.10-12ubuntu3.1" }, { "binary_name": "schroot-dbgsym", "binary_version": "1.6.10-12ubuntu3.1" } ], "availability": "No subscription required" }