Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
[
{
"product": "apt as used in Debian Stretch and Ubuntu",
"vendor": "Debian GNU/Linux",
"versions": [
{
"status": "affected",
"version": "1.4.8 and earlier"
}
]
}
]
www.securityfocus.com/bid/106690
lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
lists.debian.org/debian-lts-announce/2019/01/msg00013.html
lists.debian.org/debian-lts-announce/2019/01/msg00014.html
security.netapp.com/advisory/ntap-20190125-0002/
usn.ubuntu.com/3863-1/
usn.ubuntu.com/3863-2/
www.debian.org/security/2019/dsa-4371