today i set up the Greenbone version 22.4 on a ubuntu server machine.
The installation went great and without any problems.
Now i made my first scans and got a high weakpoint on every scanned machine. That my openvas scanner is outdated
You can see the fixes that have been applied in the changelog of the package. As long you install security updates you will also receive security fixes, even when the original software has them fixed in a newer version.
Currently the latest version of the Ubuntu 22.04 Apache package is 2.4.52-1ubuntu4.7. Since you are already on that version, all known security issues are fixed. The most relevant version number in here is the last part, ubuntu4.7.
Damn, I installed a v10 Ubuntu to test - same issue you have. I was able to install 1.4 from another repository though... So if you want to have 1.4 via apt-get update, i suggest you search for another repo where 1.4 is already packaged and add this to your /etc/apt/sources.list
I would expect that the Ubuntu packet upgrade manager can handle this, even though the packages may be a few releases behind the latest stable build available at www.wireshark.org. If you need the latest version you can always go for compiling it from scratch, but that is probably a little out of scope for a linux-newbie.
Yes, you'll have to wait for Ubuntu to distribute 1.4, but you can work with 1.2.11 just fine. 1.4 has some improvements but you still can get valid results with 1.2. Compiling isn't totally rocket science but if you're new to Linux it may be a bit too confusing.
Your other option is to find a personal/private update that someone has made to suit your Ubuntu release. These are known as PPAs. lists that there are 1.4.2-2 wireshark PPAs available for Lucid (Ubuntu 10.04) and Maverick (10.10).
As with anything that is not part of the offical distribution you would have to trust that those guys are doing the right thing. That caveat aside, generally open-source evildoers are found out and extracated pretty quickly.
I was in touble about wireshark 1.6.5 on ubuntu 10.10 . many errors whiele compiling. too many dependencies and errors installing them. your post did make the difference. thank you very much. The update work and its running now.
In this tutorial we are going to explain how to upgrade the Kernel of Zorin to a newer or latest Kernel.
The reasons for upgrading are not only to be found in the necessity for latest and new drivers, but as well in better battery-management, as well in better processor-management, as well for developpers in global.
After the installation you'll find Ubuntu Mainline Kernel ...... in your Global Menu of Zorin.
In the Kernels higher than 5.15.xxx there is a global upgrade of the libssl3 package. This package is not installable in Zorin, because Zorin is based on Ubuntu 20.04 and on that point all is running behind of the latest development.
So we are going to drag in the REPO of Ubuntu 22.04 Jammy Jellyfish
Now we are simply install a newer Kernel. I did the install of version 6.0.9 -xxxx what is the latest stable kernel for Zorin to use.
Open Ubuntu Mainline Tool and search in the field for 6.0.9 kernel and simply click install
During this install you get a prompt for upgrading some requirements. click YES on that point Mainline will install the Kernel as well as some upgrade system packs (THIS WILL NOT BREAK THE SYSTEM AT ALL !!!)
Click close screen when the installer is done.
Reboot, and you are now on Kernel 6.0.9 or the kernel you have installed.
Ubuntu Mainline offers as well an uninstaller of older kernels , if you don't want the remains of 5.15 on the system just use the tool for easy removal (one by one ! )
You'll have Zorin 16.2 ,Gnome 3.38 shell running on the latest stable kernel.
Better Boot-times is a benefit on the way lol .
However, the mainline tool will show that Kernel 6.1.15 is also ready for testing and download.
Don't install this Kernel yet. It causes total freezes of Gnome after resume from suspend. I saw there is an issue on 'reloading' the Nouveau-driver when resuming from suspend. Reported of course as a 'bug' by many now.
... isn't showing up correctly. It shows up as:
sudo add-apt-repository "deb Index of /ubuntu 1 jammy main"
sudo add-apt-repository --remove "deb Index of /ubuntu 1 jammy main"
... and that borks /etc/apt/sources.list such that one cannot even do a sudo apt update.
I tried 6.0.19... SecureBoot borked it, it said the signature was invalid, so I disabled SecureBoot and tried to boot 6.0.19 again... it stalled mid-boot, just after mounting the last drive (/dev/sdg).
ZFS I had not yet tested ... I figured it would work ootb. Turns out to be indeed a no show. So I tuned up Ubuntu 22.10 to see what happens, but I ran (run ) a little out of time of private small issues.
In the upgrades to a latest kernel development is going very fast.
We are at the point that kernel 6.1.12 is now patched AND is a release canditate for LTS .... so a version you can use for a long time.
However Kernel 6.2 is out as well, but STAY AWAY from this version if you have a Broadcom Wifi situation. Reason: the bug makes your hardware as 'unknown' to the system and comments as PCI-bridge error , unknown hardware found.
Lspci - k in the Terminal showed regardless the errror, indeed the Broadcom Wifi-card as ready to use. This was a Kernel bug !!!!!
Note: Kernel 6.2.1 installs with a lot of Nvidia/ firmware - errors and missing links.
This kernel has now ALL Broadcom-drivers onboard: meaning no extra drivers to install, no special requirements for using this Brand in the system.
Of course, this kernel is a lot more than just Broadcom on board, and a big reason for using this version is : a LOT of RUST is used in the coding of kernel-parts.
Hi, I think secure boot is enabled on your computer, and if I remember well, installing kernel through mainline will not sign it. I wrote some script to sign kernel with OS installation generated certificate.
Tomorrow I will search for it and share here.
Hi, in my case, I have the famous essx8336 sound chip, and I need a newer kernel.
So with my script I can update my kernel and sign it for secure boot.
With last linux mint iso and my fresh bios update (thanks to dell), I can't boot, even by manually adding keys to secure boot. Cert problem. SO I disable secure boot, install, boot new os, update kernel from official updates (no mainline), resign the kernel and enable secure boot, no issue.
When I read all your work, I confess that I am more a noob compared to this expertise and great work. Schooling just might be the answer for me, when I see what a Pro all can do. Really congratulations on this script, I never saw that kind of quality in my life before. It makes me even happy that the learning curve goes much more further.
Are there any, if any, books you would recommend for a experienced noob like me ?
You really blew me out of the water with this ...... 'job'- script.
If I understand a little bit of it, then 90% of the script I don't even understand at all.
Linux and Facebook does not learn much .... I understand now.
Congratulations on this fine piece of work !
--- Joris