help on Vulnerability scan on rocky linux 9.3

214 views
Skip to first unread message

Montini Junior

unread,
May 9, 2024, 9:20:09 AM5/9/24
to Wazuh | Mailing List
Hello, I'm trying to enable vulnerability scanning on a Rocky Linux 9.3 agent. I've done this before in a lab environment, and it worked smoothly with just this configuration in the ossec.conf. but in my production environment the scan on rocky it's not working :( 

    <!-- RedHat OS vulnerabilities -->
    <provider name="redhat">
      <enabled>yes</enabled>
      <os>5</os>
      <os>6</os>
      <os>7</os>
      <os>8</os>
      <os>9</os>
      <os allow="Rocky Linux-9">9</os>
      <os allow="CentOS Linux-7">9</os>
      <update_interval>1h</update_interval>
    </provider>

Nicolas Alejandro Bertoldo

unread,
May 9, 2024, 9:35:51 AM5/9/24
to Wazuh | Mailing List
Hi Montini Junior,

I hope you are doing fine.
Which wazuh version do you have installed in your production environment?
Please, could you share with us the complete vulnerability detector configuration block?

Thanks.

Xavier Muñoz

unread,
Jun 17, 2024, 3:32:58 AM6/17/24
to Wazuh | Mailing List
Hello,
I have the same problem.
Agent scanning a Rocky 9.3
Agent version v4.7.3
Wazuh manager: [{"WAZUH_VERSION":"v4.7.3"},{"WAZUH_REVISION":"40714"},{"WAZUH_TYPE":"server"}]}

My ossec.conf:

 <vulnerability-detector>
    <enabled>yes</enabled>
    <interval>5m</interval>
    <min_full_scan_interval>6h</min_full_scan_interval>
    <run_on_start>yes</run_on_start>

    <!-- Ubuntu OS vulnerabilities -->
    <provider name="canonical">
      <enabled>no</enabled>
      <os>trusty</os>
      <os>xenial</os>
      <os>bionic</os>
      <os>focal</os>
      <os>jammy</os>
      <update_interval>1h</update_interval>
    </provider>

    <!-- Debian OS vulnerabilities -->
    <provider name="debian">
      <enabled>no</enabled>
      <os>buster</os>
      <os>bullseye</os>
      <os>bookworm</os>
      <update_interval>1h</update_interval>
    </provider>

    <!-- RedHat OS vulnerabilities -->
    <provider name="redhat">
      <enabled>yes</enabled>
      <os>5</os>
      <os>6</os>
      <os>7</os>
      <os>8</os>
      <os>9</os>
      <os allow="Rocky Linux-9">9</os>
      <update_interval>1h</update_interval>
    </provider>

    <!-- Amazon Linux OS vulnerabilities -->
    <provider name="alas">
      <enabled>no</enabled>
      <os>amazon-linux</os>
      <os>amazon-linux-2</os>
      <os>amazon-linux-2022</os>
      <os>amazon-linux-2023</os>
      <update_interval>1h</update_interval>
    </provider>

    <!-- SUSE OS vulnerabilities -->
    <provider name="suse">
      <enabled>no</enabled>
      <os>11-server</os>
      <os>11-desktop</os>
      <os>12-server</os>
      <os>12-desktop</os>
      <os>15-server</os>
      <os>15-desktop</os>
      <update_interval>1h</update_interval>
    </provider>
    <!-- Arch OS vulnerabilities -->
    <provider name="arch">
      <enabled>no</enabled>
      <update_interval>1h</update_interval>
    </provider>

    <!-- Alma Linux OS vulnerabilities -->
    <provider name="almalinux">
      <enabled>no</enabled>

      <os>8</os>
      <os>9</os>
      <update_interval>1h</update_interval>
    </provider>

    <!-- Windows OS vulnerabilities -->
    <provider name="msu">
      <enabled>yes</enabled>
      <update_interval>1h</update_interval>
    </provider>

    <!-- Aggregate vulnerabilities -->
    <provider name="nvd">
      <enabled>yes</enabled>
      <update_interval>1h</update_interval>
    </provider>

  </vulnerability-detector>

El dia dijous, 9 de maig del 2024 a les 15:35:51 UTC+2, Nicolas Alejandro Bertoldo va escriure:

Xavier Muñoz

unread,
Jun 17, 2024, 3:33:02 AM6/17/24
to Wazuh | Mailing List
I have the same problem.
wazuh agent on Rocky linux 9.3 with version v4.7.3
wazuh manager: [{"WAZUH_VERSION":"v4.7.3"},{"WAZUH_REVISION":"40714"},{"WAZUH_TYPE":"server"}]}

My ossec.conf:
  <vulnerability-detector>
    <enabled>yes</enabled>
    <interval>5m</interval>
    <min_full_scan_interval>6h</min_full_scan_interval>
    <run_on_start>yes</run_on_start>

    <!-- Ubuntu OS vulnerabilities -->
    <provider name="canonical">
      <enabled>no</enabled>
      <os>trusty</os>
      <os>xenial</os>
      <os>bionic</os>
      <os>focal</os>
      <os>jammy</os>
      <update_interval>1h</update_interval>
    </provider>

    <!-- Debian OS vulnerabilities -->
    <provider name="debian">
      <enabled>no</enabled>
      <os>buster</os>
      <os>bullseye</os>
      <os>bookworm</os>
      <update_interval>1h</update_interval>
    </provider>

    <!-- RedHat OS vulnerabilities -->
    <provider name="redhat">
      <enabled>yes</enabled>
      <!-- Commented deprecated verions

      <os>5</os>
      <os>6</os>
      <os>7</os>
      end of deprecated verions -->

      <os>8</os>
      <os>9</os>
      <os allow="Rocky Linux-9">9</os>
      <update_interval>1h</update_interval>
    </provider>

    <!-- Amazon Linux OS vulnerabilities -->
    <provider name="alas">
      <enabled>no</enabled>
      <os>amazon-linux</os>
      <os>amazon-linux-2</os>
      <os>amazon-linux-2022</os>
      <os>amazon-linux-2023</os>
      <update_interval>1h</update_interval>
    </provider>

    <!-- SUSE OS vulnerabilities -->
    <provider name="suse">
      <enabled>no</enabled>
      <os>11-server</os>
      <os>11-desktop</os>
      <os>12-server</os>
      <os>12-desktop</os>
      <os>15-server</os>
      <os>15-desktop</os>
      <update_interval>1h</update_interval>
    </provider>

    <!-- Arch OS vulnerabilities -->
    <provider name="arch">
      <enabled>no</enabled>
      <update_interval>1h</update_interval>
    </provider>

    <!-- Alma Linux OS vulnerabilities -->
    <provider name="almalinux">
      <enabled>no</enabled>

      <os>8</os>
      <os>9</os>
      <update_interval>1h</update_interval>
    </provider>

    <!-- Windows OS vulnerabilities -->
    <provider name="msu">
      <enabled>yes</enabled>
      <update_interval>1h</update_interval>
    </provider>

    <!-- Aggregate vulnerabilities -->
    <provider name="nvd">
      <enabled>yes</enabled>
      <update_interval>1h</update_interval>
    </provider>

  </vulnerability-detector>
El dia dijous, 9 de maig del 2024 a les 15:35:51 UTC+2, Nicolas Alejandro Bertoldo va escriure:
Hi Montini Junior,
Reply all
Reply to author
Forward
0 new messages