Debian: DSA-5213-1: schroot security update
Summary
Note that existing chroots and sessions are checked during upgrade, and
an upgrade is aborted if any future invalid name is detected.
Problematic session and chroots can be checked before upgrading with the
following command:
schroot --list --all | LC_ALL=C grep -vE '^[a-z]+:[a-zA-Z0-9][a-zA-Z0-9_.-]*$'
See
for instructions on how to resolve such a situation.
For the stable distribution (bullseye), this problem has been fixed in
version 1.6.10-12+deb11u1.
We recommend that you upgrade your schroot packages.
For the detailed security status of schroot please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/source-package/schroot
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/