Tenable Core 2023 Release Notes
These release notes summarize updates made to Tenable Core in 2023. Downloading and installing the most recent version of the offline ISO image initiates these updates on your Tenable Core machine.
Tip: Tenable recommends applying all offline updates, in order, to your offline Tenable Core machine. Do not skip offline updates.
To update using the Tenable Core offline ISO image, see the documentation for your application:
- Tenable Core + Tenable Nessus
- Tenable Core + Tenable Nessus Network Monitor
- Tenable Core + Tenable Security Center
- Tenable Core + Tenable Web App Scanning
Note: To update Tenable Core + OT Security using the offline ISO image, contact Tenable Support.
For more information about product updates, see the release notes for your application.
Q3 2023
-
Fixed an issue on the updates management page where clearing username and password via proxy settings failed to clear them from the system proxy config.
-
Fixed a bug that accepted incorrect proxy URLs.
-
Fixed an issue where certain valid Tenable Nessus configuration-only backups were rejected as invalid when attempting to restore them in the Tenable Core web UI.
Note: CE*A items reference EL7 operating systems and EL*A items reference OL8 operating systems.
This ISO includes the following updates:
CESA-2023:4233 Moderate java-11-openjdk security and bug fix update
CESA-2023:3944 Low CentOS 7 open-vm-tools Security Update
CESA-2023:4151 Important CentOS 7 kernel Security Update
CESA-2023:4152 Important CentOS 7 bind Security Update
CESA-2023:4382 Important CentOS 7 openssh security update
CESA-2023:4766 Important CentOS 7 cups security update
CESA-2023:4819 Important CentOS 7 kernel security and bug fix update
CEBA-2023:4825 CentOS 7 net-snmp bug fix update
CEBA-2023:4826 CentOS 7 389-ds-base bug fix update
ELSA-2023-12655 Critical linux-firmware security update
ELSA-2023-12691 Critical linux-firmware security update
ELSA-2023-3811 Important python39:3.9 and python39-devel:3.9 security update
ELSA-2023-4102 Important bind security update
ELSA-2023-4419 Important openssh security update
ELSA-2023-3837 Moderate systemd security and bug fix update
ELSA-2023-3847 Moderate kernel security, bug fix, and enhancement update
ELSA-2023-4175 Moderate java-11-openjdk security and bug fix update
ELBA-2023-12534 lvm2 bug fix update
ELBA-2023-12594 systemd bug fix update
ELBA-2023-12706 cloud-init bug fix update
ELBA-2023-26563 perl-IO-Interactive Bug Fix update
ELBA-2023-26580 perl-IO-Interactive Bug Fix update
ELBA-2023-3829 cockpit-appstream bug fix update
ELBA-2023-3841 kexec-tools bug fix update
ELBA-2023-3844 xfsprogs bug fix update
ELBA-2023-3845 NetworkManager bug fix update
ELBA-2023-4279 sos bug fix and enhancement update
ELEA-2023-3849 iproute bug fix update
ELEA-2023-3850 krb5 bug fix update
ELSA-2023-12714 Important linux-firmware security update
ELSA-2023-4517 Important kernel security and bug fix update
ELSA-2023-12723 Moderate microcode_ctl security update
ELSA-2023-4498 Moderate dbus security update
ELSA-2023-4524 Moderate libcap security update
ELSA-2023-4529 Moderate libxml2 security update
ELSA-2023-4523 Moderate curl security update
ELBA-2023-4530 cloud-init bug fix update
ELBA-2023-12718 sos bug fix update
ELBA-2023-3846 selinux-policy bug fix update
ELBA-2023-4521 NetworkManager bug fix update
ELBA-2023-4534 pcp bug fix and enhancement update
ELBA-2023-4538 java-11-openjdk bug fix and enhancement update
ELEA-2023-3843 microcode_ctl bug fix and enhancement update
ELBA-2023-4525 sssd bug fix update
ELBA-2023-12774 binutils bug fix update
ELBA-2023-4518 iscsi-initiator-utils bug fix update
ELBA-2023-12734 linux-firmware bug fix update
ELBA-2023-4880 sos bug fix and enhancement update
ELBA-2023-4526 systemd bug fix update
ELSA-2023-5259 Moderate mariadb:10.3 security, bug fix, and enhancement update
ELSA-2023-5312 Important open-vm-tools security update
ELSA-2023-5252 Moderate dmidecode security update
ELSA-2023-5244 Important kernel security, bug fix, and enhancement update
ELSA-2023-5249 Moderate ncurses security update
ELBA-2023-5262 open-vm-tools bug fix update
ELBA-2023-5258 openscap bug fix and enhancement update
ELBA-2023-5260 ostree bug fix update
ELBA-2023-5242 firewalld bug fix update
ELBA-2023-5248 ca-certificates bug fix and enhancement update
ELBA-2023-5254 cups bug fix update
ELBA-2023-12849 gcc bug fix update
ELEA-2023-4995 microcode_ctl bug fix and enhancement update
ELSA-2023-12839 Important kernel security update
ELSA-2023-5353 Moderate libtiff security update
ELBA-2023-5251 iptables bug fix advisory
ELBA-2023-5253 selinux-policy bug fix update
ELBA-2023-5354 sos bug fix and enhancement update
ELBA-2023-5257 nss and nspr bug fix and enhancement update
ELSA-2023-2951 kernel security, bug fix, and enhancement update
ELSA-2023-2963 curl security and bug fix update
ELSA-2023-3000 dhcp security and bug fix update
Type | Reference |
---|---|
CentOS 7 : open-vm-tools (CESA-2023:3944) |
CVE-2023-20867 |
CentOS 7 : kernel (CESA-2023:4151) |
CVE-2022-3564 |
CentOS 7 : bind (CESA-2023:4152) |
CVE-2023-2828 |
RHEL 7 : open-vm-tools (RHSA-2023:3944) |
CVE-2023-20867 |
RHEL 7 : kernel (RHSA-2023:4151) |
CVE-2022-3564 |
RHEL 7 : bind (RHSA-2023:4152) |
CVE-2023-2828 |
RHEL 7 : java-11-openjdk (RHSA-2023:4233) |
CVE-2023-22006 |
RHEL 7 : openssh (RHSA-2023:4382) |
CVE-2023-38408 |
RHEL 7 : cups (RHSA-2023:4766) |
CVE-2023-32360 |
RHEL 7 : kernel (RHSA-2023:4819) |
CVE-2023-20593 |
Type | Reference |
---|---|
Oracle Linux 8 : linux-firmware (ELSA-2023-12655) |
CVE-2023-20593 |
Oracle Linux 8 : linux-firmware (ELSA-2023-12691) |
CVE-2023-20593 |
Oracle Linux 8 : linux-firmware (ELSA-2023-12714) |
CVE-2023-20569 |
Oracle Linux 8 : microcode_ctl (ELSA-2023-12723) |
CVE-2022-40982 |
Oracle Linux 8 : kernel (ELSA-2023-12839) |
CVE-2023-20593 |
Oracle Linux 8 : c-ares (ELSA-2023-3584) |
CVE-2023-32067 |
Oracle Linux 8 : python3 (ELSA-2023-3591) |
CVE-2023-24329 |
Oracle Linux 8 : python39:3.9 / and / python39-devel:3.9 (ELSA-2023-3811) |
CVE-2023-24329 |
Oracle Linux 8 : systemd (ELSA-2023-3837) |
CVE-2023-26604 |
Oracle Linux 8 : libssh (ELSA-2023-3839) |
CVE-2023-1667 |
Oracle Linux 8 : sqlite (ELSA-2023-3840) |
CVE-2020-24736 |
Oracle Linux 8 : kernel (ELSA-2023-3847) |
CVE-2023-28466 |
Oracle Linux 8 : bind (ELSA-2023-4102) |
CVE-2023-2828 |
Oracle Linux 8 : java-11-openjdk (ELSA-2023-4175) |
CVE-2023-22006 |
Oracle Linux 8 : openssh (ELSA-2023-4419) |
CVE-2023-38408 |
Oracle Linux 8 : dbus (ELSA-2023-4498) |
CVE-2023-34969 |
Oracle Linux 8 : kernel (ELSA-2023-4517) |
CVE-2022-42896 |
Oracle Linux 8 : curl (ELSA-2023-4523) |
CVE-2023-27536 |
Oracle Linux 8 : libcap (ELSA-2023-4524) |
CVE-2023-2602 |
Oracle Linux 8 : libxml2 (ELSA-2023-4529) |
CVE-2023-28484 |
Oracle Linux 8 : kernel (ELSA-2023-5244) |
CVE-2023-2002 |
Oracle Linux 8 : ncurses (ELSA-2023-5249) |
CVE-2023-29491 |
Oracle Linux 8 : dmidecode (ELSA-2023-5252) |
CVE-2023-30630 |
Oracle Linux 8 : mariadb:10.3 (ELSA-2023-5259) |
CVE-2022-32084 |
Oracle Linux 8 : open-vm-tools (ELSA-2023-5312) |
CVE-2023-20900 |
Oracle Linux 8 : libtiff (ELSA-2023-5353) |
CVE-2023-0800 |
Tenable Core on Oracle Linux 8 - NNM and Tenable Web App Scanning
Tenable has chosen Oracle Linux 8 as our new open-source platform. This replaces Tenable Core + Nessus Network Monitor and Tenable Core + Web App Scanning on CentOS 7.0. Both platforms will continue to coexist until June 2024, when CentOS 7 reaches its end of life.
-
Tenable Core is now based on Oracle Linux 8.
-
Tenable applications (e.g., Nessus Network Monitor, Tenable Web App Scanning, etc.) are now at the top of the side navigation bar in their own section.
-
System hardening now uses the openscap tooling (and can be checked with openscap tooling).
-
Installation from ISO now presents a graphical interface when errors are encountered.
-
Tenable Core now uses python 3.
-
GPG signature checking is enabled for all package repositories.
-
Password complexity rules have been dropped in favor of NIST Special Publication 800-63B - Appendix A—Strength of Memorized Secrets recommended minimum length requirements
-
Software updates have moved from the Software Updates page to the Update Management page.
-
Relevant documentation links are available under the Help menu in the user interface.
-
The user interface now allows for gaining and dropping admin privileges from within the user interface.
-
ISO installation user interface allows for superior network configuration.
-
System welcome banner message can now be edited from within the user interface.
Note: NNM's High Performance Mode is not supported.
Tenable One-Click Nessus Agent
Tenable now supports a One-Click deployment of Nessus Agents via Microsoft's Azure portal. This solution provides an easy way to install the latest version of Nessus Agent on Azure virtual machines (VM) (whether Linux or Windows) by either clicking on an icon within the Azure portal, or by writing a few lines of PowerShell script.
For more information, see the integration documentation.
-
A Tenable Vulnerability Management, or Tenable Nessus Manager, account.
-
A Microsoft Azure account with one (or more) Windows or Linux VMs.
Microsoft Azure VM running any of the following:
-
CentOS 7 (x86_64)
-
Debian 11 (x86_64)
-
Oracle Linux 7 and 8 (x86_64)
-
Red Hat ES 7, 8 and 9 (x86_64)
-
Rocky Linux 9 (x86_64)
-
Ubuntu 18.04, 20.04 and 22.04 (x86_64)
-
Red Hat ES 8 and 9 (ARM64)
-
Windows 10 and 11 (x86_64)
-
Windows Server 2012 and 2012 R2 (x86_64)
-
Windows Server 2016, 2019 and 2022 (x86_64)
Q2 2023
-
Dates in the Certificates, Backups, and Update Management pages of the Tenable Core web user interface are now displayed in the browser's locale.
-
Fixed an issue where device configuration files accumulate in /var/run/NetworkManager/devices.
-
Fixed an issue where weekly automatic updates could not be scheduled.
Note: CE*A items reference EL7 operating systems and EL*A items reference OL8 operating systems.
This ISO includes the following updates:
CEBA-2023:1534 CentOS 7 tzdata BugFix Update
CEBA-2023:1989 CentOS 7 cronie bug fix and enhancement update
CEBA-2023:3484 CentOS 7 kernel bug fix update
CESA-2023:3555 Important CentOS 7 python security update
CESA-2023:3556 Important CentOS 7 python3 security update
CEBA-2023:3843 CentOS 7 nss-pem bug fix and enhancement update
CEBA-2023:3847 CentOS 7 pki-core bug fix update
CESA-2023:1875 Important CentOS 7 java-11-openjdk Security Update
CESA-2023:1987 Moderate kernel security and bug fix update
ELBA-2023-2745 pcp bug fix and enhancement update
ELBA-2023-2754 udisks2 bug fix and enhancement update
ELBA-2023-2777 cloud-init bug fix and enhancement update
ELBA-2023-2778 jq bug fix and enhancement update
ELBA-2023-2811 389-ds:1.4 bug fix and enhancement update
ELBA-2023-2820 python-rpm-macros bug fix and enhancement update
ELBA-2023-2821 cockpit-appstream bug fix and enhancement update
ELBA-2023-2849 wget bug fix and enhancement update
ELBA-2023-2917 eth-tools bug fix and enhancement update
ELBA-2023-2944 WALinuxAgent bug fix and enhancement update
ELBA-2023-2947 pciutils bug fix and enhancement update
ELBA-2023-2949 binutils bug fix and enhancement update
ELBA-2023-2955 glibc bug fix and enhancement update
ELBA-2023-2960 coreutils bug fix and enhancement update
ELBA-2023-2968 NetworkManager bug fix and enhancement update
ELBA-2023-2971 python3 bug fix and enhancement update
ELBA-2023-2973 dbus bug fix and enhancement update
ELBA-2023-2975 dnf-plugins-core bug fix and enhancement update
ELBA-2023-2979 libdnf bug fix and enhancement update
ELBA-2023-2980 dnf bug fix and enhancement update
ELBA-2023-2985 systemd bug fix and enhancement update
ELBA-2023-2986 sssd bug fix and enhancement update
ELBA-2023-2892 openscap bug fix and enhancement update
ELBA-2023-2995 realmd bug fix and enhancement update
ELBA-2023-2998 mdadm bug fix and enhancement update
ELBA-2023-3003 iptables bug fix and enhancement update
ELBA-2023-3005 glib2 bug fix and enhancement update
ELBA-2023-3008 libssh bug fix and enhancement update
ELBA-2023-3016 tar bug fix and enhancement update
ELBA-2023-3021 rpm bug fix and enhancement update
ELBA-2023-3028 hwdata bug fix and enhancement update
ELBA-2023-3032 openssh bug fix and enhancement update
ELBA-2023-3033 virt-what bug fix and enhancement update
ELBA-2023-3034 policycoreutils bug fix and enhancement update
ELBA-2023-3038 openssl-pkcs11 bug fix and enhancement update
ELBA-2023-3040 sudo bug fix and enhancement update
ELBA-2023-3043 perl bug fix and enhancement update
ELBA-2023-3044 grub2 bug fix and enhancement update
ELBA-2023-3054 util-linux bug fix and enhancement update
ELBA-2023-3414 sos bug fix and enhancement update
ELBA-2023-12353 openssh bug fix update
ELBA-2023-12366 glibc bug fix update
ELBA-2023-12388 oraclelinux-release bug fix update
ELBA-2023-22009 fedora-license-data Bug Fix update
ELBA-2023-22016 fedora-license-data Bug Fix update
ELBA-2023-22231 distribution-gpg-keys Bug Fix update
ELBA-2023-22543 tcpreplay Bug Fix update
ELBA-2023-22562 tcpreplay Bug Fix update
ELBA-2023-22707 hwinfo Bug Fix update
ELBA-2023-22709 fedora-license-data Bug Fix update
ELBA-2023-22728 hwinfo Bug Fix update
ELBA-2023-22730 fedora-license-data Bug Fix update
ELBA-2023-23830 fedora-license-data Bug Fix update
ELBA-2023-23861 fedora-license-data Bug Fix update
ELBA-2023-24146 cpuid Bug Fix update
ELSA-2023-2763 python38:3.8 and python38-devel:3.8 security update
ELSA-2023-2764 python39:3.9 and python39-devel:3.9 security update
ELSA-2023-2898 libtar security update
ELSA-2023-2951 kernel security, bug fix, and enhancement update
ELSA-2023-2963 curl security and bug fix update
ELSA-2023-3000 dhcp security and bug fix update
ELSA-2023-3018 libarchive security update
ELSA-2023-3106 curl security and bug fix update
ELSA-2023-3349 kernel security and bug fix update
ELSA-2023-12298 cloud-init security update
Type | Reference |
---|---|
CentOS 7 : java-11-openjdk (CESA-2023:1875) |
CVE-2023-21930 |
RHEL 7 : java-11-openjdk (RHSA-2023:1875) |
CVE-2023-21930 |
RHEL 7 : kernel (RHSA-2023:1987) |
CVE-2022-43750 |
RHEL 7 : python3 (RHSA-2023:3556) |
CVE-2023-24329 |
Oracle Linux 8 : cloud-init (ELSA-2023-12298) |
CVE-2023-1786 |
Oracle Linux 8 : python38:3.8 / and / python38-devel:3.8 (ELSA-2023-2763) |
CVE-2020-10735 |
Oracle Linux 8 : python39:3.9 / and / python39-devel:3.9 (ELSA-2023-2764) |
CVE-2020-10735 |
Oracle Linux 8 : libtar (ELSA-2023-2898) |
CVE-2021-33643 |
Oracle Linux 8 : kernel (ELSA-2023-2951) |
CVE-2021-26341 |
Oracle Linux 8 : curl (ELSA-2023-2963) |
CVE-2022-35252 |
Oracle Linux 8 : dhcp (ELSA-2023-3000) |
CVE-2022-2928 |
Oracle Linux 8 : libarchive (ELSA-2023-3018) |
CVE-2022-36227 |
Oracle Linux 8 : curl (ELSA-2023-3106) |
CVE-2023-27535 |
Oracle Linux 8 : kernel (ELSA-2023-3349) |
CVE-2023-32233 |
Tenable Core on Oracle Linux 8
Tenable has chosen Oracle Linux 8 as our new open-source platform. This replaces Tenable Core + Nessus and Tenable Core + Security Center on CentOS 7.0. Both platforms will continue to coexist until June 2024, when CentOS 7 reaches its end of life. We encourage all customers to adopt the new OL8 version as soon as possible. The upgrade to Tenable Core from CentOS to Oracle 8 is a manual process. For more information, see the Tenable Core + Nessus and Tenable Core + Security Center migration guides.
-
Tenable Core is now based on Oracle Linux 8.
-
Tenable applications (e.g., Nessus, Security Center, etc.) are now at the top of the side navigation bar in their own section.
-
System hardening now uses the openscap tooling (and can be checked with openscap tooling).
-
Installation from ISO now presents a graphical interface when errors are encountered.
-
Tenable Core now uses python 3.
-
GPG signature checking is enabled for all package repositories.
-
Password complexity rules have been dropped in favor of NIST Special Publication 800-63B - Appendix A—Strength of Memorized Secrets recommended minimum length requirements
-
Software updates have moved from the Software Updates page to the Update Management page.
-
Migration of Tenable Security Center and Nessus from current (EL7) Tenable Core systems to new (OL8) Tenable Core systems is supported via backup and restore mechanisms.
-
Relevant documentation links are available under the Help menu in the user interface.
-
The user interface now allows for gaining and dropping admin privileges from within the user interface.
-
ISO installation user interface allows for more/better/easier network configuration.
-
System welcome banner message can now be edited from within the user interface.
Q1 2023
-
Tenable Core OVAs with Tenable Security Center 6.0 or newer now contain two virtual disks. The disks are combined into a single volume group and there should be no impact to normal usage. Tenable Core + Tenable Security Center ISOs format and use two disks if they are available at install time.
-
Incomplete backups no longer fill /opt/tenablecore/spool if automatic backups are enabled but remote storage is not configured.
-
Fixed problems setting alternate listening ports for Tenable Security Center in the web user interface.
-
Feedback is now displayed in the web user interface if uploading a trusted CA fails.
This ISO includes the following updates:
CESA-2023:0045 Important CentOS 7 tigervnc Security Update
CESA-2023:0046 Important CentOS 7 xorg-x11-server Security Update
CESA-2023:0195 Moderate CentOS 7 java-11-openjdk Security Update
CESA-2023:0203 Moderate CentOS 7 java-1.8.0-openjdk Security Update
CESA-2023:0291 Important CentOS 7 sudo Security Update
CESA-2023:0296 Important CentOS 7 firefox Security Update
CESA-2023:0377 Important CentOS 7 libXpm Security Update
CESA-2023:0399 Important CentOS 7 kernel Security Update
CESA-2023:0402 Moderate CentOS 7 bind Security Update
CESA-2023:0403 Important CentOS 7 sssd Security Update
CESA-2023:0456 Important CentOS 7 thunderbird Security Update
CEBA-2023:0398 CentOS 7 resource-agents BugFix Update
CEBA-2023:0401 CentOS 7 httpd BugFix Update
CESA-2023:1091 Important CentOS 7 kernel Security Update
CESA-2023:1095 Moderate CentOS 7 zlib Security Update
CEBA-2023:1096 CentOS 7 autofs BugFix Update
CEBA-2023:1097 CentOS 7 pki-core BugFix Update
CEBA-2023:1098 CentOS 7 diffutils BugFix Update
CESA-2023:1332 Important CentOS 7 nss Security Update
CESA-2023:1335 Important CentOS 7 openssl Security Update
Type | Reference |
---|---|
CentOS 7: tigervnc (CESA-2023:0045) |
CVE-2022-4283 |
CentOS 7: xorg-x11-server (CESA-2023:0046) |
CVE-2022-4283 |
CentOS 7: java-11-openjdk (CESA-2023:0195) |
CVE-2023-21835 |
CentOS 7 : java-1.8.0-openjdk (CESA-2023:0203) |
CVE-2023-21830 |
CentOS 7 : sudo (CESA-2023:0291) |
CVE-2023-22809 |
CentOS 7 : firefox (CESA-2023:0296) |
CVE-2022-46871 |
CentOS 7 : libXpm (CESA-2023:0377) |
CVE-2022-4883 |
CentOS 7 : kernel (CESA-2023:0399) |
CVE-2021-26401 |
CentOS 7 : bind (CESA-2023:0402) |
CVE-2021-25220 |
CentOS 7 : sssd (CESA-2023:0403) |
CVE-2022-4254 |
CentOS 7 : thunderbird (CESA-2023:0456) |
CVE-2022-46871 |
CentOS 7 : kernel (CESA-2023:1091) |
CVE-2022-42703 |
CentOS 7 : zlib (CESA-2023:1095) |
CVE-2022-37434 |
CentOS 7 : nss (CESA-2023:1332) |
CVE-2023-0767 |
CentOS 7 : openssl (CESA-2023:1335) |
CVE-2023-0286 |