03-04-2021 06:41 AM
My scanning team keeps finding vulnerabilities on Expedition and keep requesting I patch them. They all seem to be related to Linux not Expedition itself. I know that I can't upgrade the version of Ubuntu that it runs on. Suggestions?
list of some of the vulnerabilities
03-04-2021 09:06 AM
Update your apache2 service to patch these vulnerabilities. The latest version of apache2 is running on 2.4.46 so I used that in this example and after you restart apache2 it should be reachable, and please back up the VM if for any event you have problems after the upgrade.
sudo add-apt-repo ppa:ondrej/apache2
sudo apt-get install apache2=2.4.46-2+ubuntu16.04.1+deb.sury.org+3
apache2 -v (it is now on the latest)
sudo service apache2 restart
03-04-2021 12:37 PM
thanks for the suggestions. The first command doesn't comeback as a valid command. The expedition is just as Palo supplied it if that matters in this instance. I run the version check and I get this
Server version: Apache/2.4.18 (Ubuntu)
Server built: 2020-08-12T21:35:50
03-04-2021 12:42 PM
The first command is reaching out to a remote repository please make sure if you are running a proxy it has access to communicate with it. The Apache Version is 2.4.18 so when you run what I suggested then you should now be on 2.4.46 when you run the version check.
03-04-2021 12:50 PM
thanks to your suggestions I found I needed to run this
sudo add-apt-repository ppa:ondrej/apache2 sudo apt update sudo apt upgrade sudo apt-get dist-upgrade
this did the trick for me on the upgrade, will wait on the scanning team, thanks again
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!