Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
{ "binaries": [ { "binary_name": "apt", "binary_version": "1.0.1ubuntu2.19" }, { "binary_name": "apt-transport-https", "binary_version": "1.0.1ubuntu2.19" }, { "binary_name": "apt-utils", "binary_version": "1.0.1ubuntu2.19" }, { "binary_name": "libapt-inst1.5", "binary_version": "1.0.1ubuntu2.19" }, { "binary_name": "libapt-pkg-dev", "binary_version": "1.0.1ubuntu2.19" }, { "binary_name": "libapt-pkg4.12", "binary_version": "1.0.1ubuntu2.19" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "apt", "binary_version": "1.2.29ubuntu0.1" }, { "binary_name": "apt-transport-https", "binary_version": "1.2.29ubuntu0.1" }, { "binary_name": "apt-utils", "binary_version": "1.2.29ubuntu0.1" }, { "binary_name": "libapt-inst2.0", "binary_version": "1.2.29ubuntu0.1" }, { "binary_name": "libapt-pkg-dev", "binary_version": "1.2.29ubuntu0.1" }, { "binary_name": "libapt-pkg5.0", "binary_version": "1.2.29ubuntu0.1" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "apt", "binary_version": "1.6.6ubuntu0.1" }, { "binary_name": "apt-transport-https", "binary_version": "1.6.6ubuntu0.1" }, { "binary_name": "apt-utils", "binary_version": "1.6.6ubuntu0.1" }, { "binary_name": "libapt-inst2.0", "binary_version": "1.6.6ubuntu0.1" }, { "binary_name": "libapt-pkg-dev", "binary_version": "1.6.6ubuntu0.1" }, { "binary_name": "libapt-pkg5.0", "binary_version": "1.6.6ubuntu0.1" } ], "availability": "No subscription required" }