It was discovered that Schroot incorrectly handled certain Schroot names. An attacker could possibly use this issue to break schroot's internal state causing a denial of service.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "1.6.10-1ubuntu3+esm1", "binary_name": "dchroot" }, { "binary_version": "1.6.10-1ubuntu3+esm1", "binary_name": "dchroot-dbgsym" }, { "binary_version": "1.6.10-1ubuntu3+esm1", "binary_name": "dchroot-dsa" }, { "binary_version": "1.6.10-1ubuntu3+esm1", "binary_name": "dchroot-dsa-dbgsym" }, { "binary_version": "1.6.10-1ubuntu3+esm1", "binary_name": "libsbuild-dev" }, { "binary_version": "1.6.10-1ubuntu3+esm1", "binary_name": "libsbuild-dev-dbgsym" }, { "binary_version": "1.6.10-1ubuntu3+esm1", "binary_name": "libsbuild-doc" }, { "binary_version": "1.6.10-1ubuntu3+esm1", "binary_name": "schroot" }, { "binary_version": "1.6.10-1ubuntu3+esm1", "binary_name": "schroot-common" }, { "binary_version": "1.6.10-1ubuntu3+esm1", "binary_name": "schroot-dbg" }, { "binary_version": "1.6.10-1ubuntu3+esm1", "binary_name": "schroot-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.6.10-4ubuntu0.1", "binary_name": "schroot" }, { "binary_version": "1.6.10-4ubuntu0.1", "binary_name": "schroot-common" }, { "binary_version": "1.6.10-4ubuntu0.1", "binary_name": "schroot-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.6.10-9ubuntu0.1", "binary_name": "schroot" }, { "binary_version": "1.6.10-9ubuntu0.1", "binary_name": "schroot-common" }, { "binary_version": "1.6.10-9ubuntu0.1", "binary_name": "schroot-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.6.10-12ubuntu3.1", "binary_name": "schroot" }, { "binary_version": "1.6.10-12ubuntu3.1", "binary_name": "schroot-common" }, { "binary_version": "1.6.10-12ubuntu3.1", "binary_name": "schroot-dbgsym" } ] }