Tenable.sc Patch 202201.1 Release Notes (2022-01-12)
Note: This release includes fixes for vulnerabilities. For more information, see the Tenable Product Security Advisory.
Apply this patch to Tenable.sc installations running the following versions:
Tenable.sc 5.16.0 (CentOS 7 or RHEL 7)
Tenable.sc 5.16.1 (CentOS 7 or RHEL 7)
Tenable.sc 5.17.0 (CentOS 7, RHEL 7, CentOS 8, or RHEL 8)
Tenable.sc 5.18.0 (CentOS 7, RHEL 7, CentOS 8, or RHEL 8)
Tenable.sc 5.19.0 (CentOS 7, RHEL 7, CentOS 8, or RHEL 8)
Tenable.sc 5.19.1 (CentOS 7, RHEL 7, CentOS 8, RHEL 8, or Oracle Linux 8)
This patch updates Apache to version 2.4.52 and includes fixes for multiple Apache vulnerabilities: CVE-2021-44224 and CVE-2021-44790.
Steps to Apply
Apply the patch to a standalone Tenable.sc or Tenable Core + Tenable.sc:
- Download the patch from https://www.tenable.com/downloads/tenable-sc to Tenable.sc. You can save the files in any location (e.g., /tmp).
Access the command line as a user with root-level permissions.
Run the following command to untar the patch file, where [patch file name] is the name of the .tgz patch file you downloaded:
tar zxf [patch file name]
Run the following command to change the directory to the extracted directory, where [directory] is the extracted directory:
Run the following command to begin the installation:
The installation begins and Tenable.sc is stopped. After the installation finishes, Tenable.sc automatically restarts.
What to do next:
(Optional) Confirm the patch successfully applied to Tenable.sc, as described in the knowledge base article.
Filenames and Checksums
Filenames and MD5 or SHA-256 checksums are located on the Tenable.sc Downloads page.