Tenable Security Center Patch 202110.1 Release Notes (2021-10-19)
Note: This release includes fixes for vulnerabilities. For more information, see the Tenable Product Security Advisory.
Apply this patch to Tenable Security Center installations running version 5.16.0 or later. This patch includes fixes for multiple Apache vulnerabilities: CVE-2021-33193, CVE-2021-34798, and CVE-2021-40438.
Steps to Apply
Apply the patch to a standalone Tenable Security Center or Tenable Core + Tenable Security Center:
- Download the patch from https://www.tenable.com/downloads/tenable-sc to Tenable Security Center. You can save the files in any location (e.g., /tmp).
Access the command line as a user with root-level permissions.
Run the following command to untar the patch file, where [patch file name] is the name of the .tgz patch file you downloaded:
tar zxf [patch file name]
Run the following command to change the directory to the extracted directory, where [directory] is the extracted directory:
Run the following command to begin the installation:
The installation begins and Tenable Security Center is stopped. After the installation finishes, Tenable Security Center automatically restarts.
What to do next:
(Optional) Confirm the patch successfully applied to Tenable Security Center, as described in the knowledge base article.
Filenames and Checksums
Filenames and MD5 or SHA-256 checksums are located on the Tenable Security Center Downloads page.