Ubuntu 16.10 : apt regression (USN-3156-2)

High Nessus Plugin ID 96035


The remote Ubuntu host is missing a security-related patch.


USN-3156-1 fixed vulnerabilities in APT. It also caused a bug in unattended-upgrades on that may require manual intervention to repair.

Users on Ubuntu 16.10 should run the following commands at a terminal :

sudo dpkg --configure --pending sudo apt-get -f install

This update fixes the problem.

We apologize for the inconvenience.

Jann Horn discovered that APT incorrectly handled InRelease files. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered packages.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected apt package.

Plugin Details

Severity: High

ID: 96035

File Name: ubuntu_USN-3156-2.nasl

Version: $Revision: 3.3 $

Type: local

Agent: unix

Published: 2016/12/20

Modified: 2016/12/21

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.6

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:apt, cpe:/o:canonical:ubuntu_linux:16.10

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/12/16

Reference Information

OSVDB: 148956

USN: 3156-2