-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : apt Version : 1.0.9.8.6 CVE ID : CVE-2020-3810
When normalizing ar member names by removing trailing whitespace and slashes, an out-out-bound read can be caused if the ar member name consists only of such characters, because the code did not stop at 0, but would wrap around and continue reading from the stack, without any limit. For Debian 8 "Jessie", this problem has been fixed in version 1.0.9.8.6. We recommend that you upgrade your apt packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Best, Utkarsh -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAl69r9gACgkQgj6WdgbD S5YtDxAAoUOJIqruKtP+MwEDFEuI/nlcm/dUyjGyu4fIWzmUc/TjQ7ZI4UPpGB/m yrHStmk0IYDMcUizfH4l2UhTVFxKHd8GKdyTJlxMGDg8kxyDDxe888XwXUxN30G9 diBzPFsXr1QZBKtgtqnPqMm1cHdcrzcTSy8JTdB/3VvWjMLmsc/619VRAJh9eZMX y7oWrcS/wZxKJL0ZEn/yvV+38V/ZTi1QmsXHTv3zSqrvOTOQxYptkA9bAkIdbI0j ZWXbETLUI7vhJ6r5qIjl2uoUDc9xyhIuO1iSnu0ibibq70nORW/Q0ww9KzMPXR0m VOsC4AfiwC+Tg6kcwvsfEdBCWhN/JECmgXUtRXrVMHlMzHHNpUDpVS/O9K3h5SS7 OG/xluQPApP18s7v+9PtHfuvno7GI7OfxXMsRk0b94cTJGz6Hoe6pxLzb/8JmdwZ DBPZ93DRgnYO1f7kGlihuW2I35pYguJEmfdqwrYoUHNXa0fdvWPxXo1T6l8acC18 8v85JlWKlcpghwZMoOV83Nl/W6BhCwZy49DYhUFqHblPb1a2OLhdKRS0Jpk6vhln bVFOyDHgIT3NGEJt7sK3+t2ix/77xxxs9KbpesXfP3oRu1LhyVC5DJIWcmGigibW cFxKYLShRCSnvoBxX7a5Zy2c4A1lM7w4Oeh40cfQTiFzYXaxlTU= =7YqO -----END PGP SIGNATURE-----
