Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
{
"binaries": [
{
"binary_name": "apt",
"binary_version": "1.0.1ubuntu2.19"
},
{
"binary_name": "apt-transport-https",
"binary_version": "1.0.1ubuntu2.19"
},
{
"binary_name": "apt-utils",
"binary_version": "1.0.1ubuntu2.19"
},
{
"binary_name": "libapt-inst1.5",
"binary_version": "1.0.1ubuntu2.19"
},
{
"binary_name": "libapt-pkg-dev",
"binary_version": "1.0.1ubuntu2.19"
},
{
"binary_name": "libapt-pkg4.12",
"binary_version": "1.0.1ubuntu2.19"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "apt",
"binary_version": "1.2.29ubuntu0.1"
},
{
"binary_name": "apt-transport-https",
"binary_version": "1.2.29ubuntu0.1"
},
{
"binary_name": "apt-utils",
"binary_version": "1.2.29ubuntu0.1"
},
{
"binary_name": "libapt-inst2.0",
"binary_version": "1.2.29ubuntu0.1"
},
{
"binary_name": "libapt-pkg-dev",
"binary_version": "1.2.29ubuntu0.1"
},
{
"binary_name": "libapt-pkg5.0",
"binary_version": "1.2.29ubuntu0.1"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "apt",
"binary_version": "1.6.6ubuntu0.1"
},
{
"binary_name": "apt-transport-https",
"binary_version": "1.6.6ubuntu0.1"
},
{
"binary_name": "apt-utils",
"binary_version": "1.6.6ubuntu0.1"
},
{
"binary_name": "libapt-inst2.0",
"binary_version": "1.6.6ubuntu0.1"
},
{
"binary_name": "libapt-pkg-dev",
"binary_version": "1.6.6ubuntu0.1"
},
{
"binary_name": "libapt-pkg5.0",
"binary_version": "1.6.6ubuntu0.1"
}
],
"availability": "No subscription required"
}