Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Advanced_package_tool | Debian | * | 1.2.30 (excluding) |
| Advanced_package_tool | Debian | 1.3 (including) | 1.4.8 (including) |
| Apt | Ubuntu | bionic | * |
| Apt | Ubuntu | cosmic | * |
| Apt | Ubuntu | devel | * |
| Apt | Ubuntu | esm-infra-legacy/trusty | * |
| Apt | Ubuntu | esm-infra/bionic | * |
| Apt | Ubuntu | esm-infra/xenial | * |
| Apt | Ubuntu | trusty | * |
| Apt | Ubuntu | trusty/esm | * |
| Apt | Ubuntu | xenial | * |