USN-3156-2: APT regression
Publication date
17 December 2016
Overview
USN-3156-1 introduced a regression in unattended-upgrades that may require manual intervention to repair.
Releases
Packages
- apt - Advanced front-end for dpkg
Details
USN-3156-1 fixed vulnerabilities in APT. It also caused a bug in
unattended-upgrades on that may require manual intervention to repair.
Users on Ubuntu 16.10 should run the following commands at a
terminal:
sudo dpkg --configure --pending
sudo apt-get -f install
This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Jann Horn discovered that APT incorrectly handled InRelease files.
If a remote attacker were able to perform a machine-in-the-middle attack,
this flaw could potentially be used to install altered packages.
USN-3156-1 fixed vulnerabilities in APT. It also caused a bug in
unattended-upgrades on that may require manual intervention to repair.
Users on Ubuntu 16.10 should run the following commands at a
terminal:
sudo dpkg --configure --pending
sudo apt-get -f install
This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Jann Horn discovered that APT incorrectly handled InRelease files.
If a remote attacker were able to perform a machine-in-the-middle attack,
this flaw could potentially be used to install altered packages.
Update instructions
After a standard system update you should run the following commands to make all the necessary changes: sudo dpkg --configure --pending sudo apt-get -f install
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.