Ubuntu 24.04 linux-image-6.8.0-90-generic Vulnerability

63 views
Skip to first unread message

Creative Wolf (CreativeWolf)

unread,
Jan 27, 2026, 3:51:22 PM (6 days ago) Jan 27
to Wazuh | Mailing List
Heya all,

I've got about a dozen Servers running Ubuntu 24.04 with linux-image-6.8.0-90-generic kernel flagged with 1728 vulnerabilities each.

uname -r
6.8.0-90-generic

 uname -v
#91-Ubuntu SMP PREEMPT_DYNAMIC Tue Nov 18 14:14:30 UTC 2025

dpkg -s linux-image-6.8.0-90-generic | grep Version
Version: 6.8.0-90.91

I've tried deleting the agent_id.db file at /var/ossec/queue/db/ and then restarting the Manager.

Please let me know if I'm missing something and how to globally suppress these from popping up.

Thanks

CreativeWolf

Javier Adán Méndez Méndez

unread,
Jan 27, 2026, 5:16:26 PM (6 days ago) Jan 27
to Wazuh | Mailing List
Hi 

Deleting agent_id.db won’t help here. Wazuh Vulnerability Detection is based on the Syscollector , so if you have multiple linux-image-* kernels installed, Wazuh will evaluate all of them and the vulnerability count can explode

you can try  this: 

1. Update + reboot into the newest kernel, then remove old kernels:

sudo apt update && sudo apt full-upgrade -y
sudo reboot
sudo apt autoremove --purge -y

2. Verify installed kernels:

Creative Wolf (CreativeWolf)

unread,
Jan 28, 2026, 4:05:46 AM (5 days ago) Jan 28
to Wazuh | Mailing List
Hi Javier,

Thanks for your time and input.

I've done these steps and  linux-image-6.8.0-90-generic is the only kernel available.

However, Wazuh is listing vulnerabilities for this kernel version despite it being the latest patched version.

uname -v
#91-Ubuntu SMP PREEMPT_DYNAMIC Tue Nov 18 14:14:30 UTC 2025


I've tried these configuration changes but they are not taking effect - the conflict between Canonical and NVD still is not resolved.

Appreciate any inputs please.

Thanks

Javier Adán Méndez Méndez

unread,
Jan 28, 2026, 5:35:37 PM (5 days ago) Jan 28
to Wazuh | Mailing List

Hi ,

I read #15731. It explains Wazuh matches your installed packages with Canonical/NVD data, so sometimes they don’t agree and you still see CVEs even on the latest kernel.

What you can do:

  1. Check the CVE in Canonical (Ubuntu CVE Tracker / USN).

  2. Open one Wazuh event and see which source is reporting it (Canonical or NVD).

  3. If Canonical says it’s fixed and you just want it quiet, ignore it with a local rule (match package/CVE → level 0).

Creative Wolf (CreativeWolf)

unread,
Jan 29, 2026, 7:04:18 AM (4 days ago) Jan 29
to Wazuh | Mailing List
Hi Javier,

Thanks for taking your time on this, appreciate it.

1. Check the CVE in Canonical (Ubuntu CVE Tracker / USN).

    • In the Ubuntu's USN, the particular kernel linux-image-6.8.0-90-generic is reportedly backported and hence no change in the version

dpkg -s linux-image-6.8.0-90-generic | grep -E "(Package|Version)"
Package: linux-image-6.8.0-90-generic
Version: 6.8.0-90.91


apt install linux-image-generic linux-headers-generic

Reading package lists... Done

Building dependency tree... Done

Reading state information... Done

linux-image-generic is already the newest version (6.8.0-90.91).

linux-image-generic set to manually installed.

linux-headers-generic is already the newest version (6.8.0-90.91).

linux-headers-generic set to manually installed.

0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.


apt dist-upgrade

Reading package lists... Done

Building dependency tree... Done

Reading state information... Done

Calculating upgrade... Done

The following upgrades have been deferred due to phasing:

  python3-distupgrade ubuntu-release-upgrader-core

0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.



2. Open one Wazuh event and see which source is reporting it (Canonical or NVD).
    • Reporting Source is Canonical
3. If Canonical says it’s fixed and you just want it quiet, ignore it with a local rule (match package/CVE → level 0).
    • Considering it's backported and the kernel is updated to the latest 6.8.0-90.91, I'd like to ignore it with the local rule, can you help me with it and point me to a documentation to aid that please?
Thank you

CreativeWolf

Javier Adán Méndez Méndez

unread,
Jan 30, 2026, 12:45:30 AM (4 days ago) Jan 30
to Wazuh | Mailing List

Hi CreativeWolf
sorry for the late reply, and thanks for the details. If you just want to silence those kernel findings, an easy workaround is a local rule on the manager to set the alert level to 0 for that package.

On the Wazuh manager, edit:
/var/ossec/etc/rules/local_rules.xml

Add this (replace 23506 with the rule ID you see in your vulnerability alert):

<group name="local,vd_suppress,">
  <rule id="100200" level="0">
    <if_sid>23506</if_sid>
    <field name="data.vulnerability.package.name">^linux-image-6\.8\.0-90-generic$</field>
    <description>Ignore VD alerts for linux-image-6.8.0-90-generic</description>
  </rule>
</group>

the restart 
sudo systemctl restart wazuh-manager}

reference:

https://documentation.wazuh.com/current/user-manual/ruleset/rules/custom.html
https://documentation.wazuh.com/current/user-manual/ruleset/ruleset-xml-syntax/rules.html

Creative Wolf (CreativeWolf)

unread,
Jan 30, 2026, 6:58:21 AM (3 days ago) Jan 30
to Wazuh | Mailing List
Hi Javier, 

Thank you for your guidance on this, I did exactly as per your recommendation.

However, while I see a lot of "Solved" in the Events but in the Dashboard and in Inventory they are still listed.

Is there anything else to be done to to remove from Dashboard and Inventory list?

Appreciate your support.

Thank you

CreativeWolf

Javier Adán Méndez Méndez

unread,
Jan 30, 2026, 6:57:32 PM (3 days ago) Jan 30
to Wazuh | Mailing List
Hi Creative Wolg

I thinks you can try 

Dashboard → Index ManagementIndexes → select wazuh-states-vulnerabilitiesDelete

Then restart:

systemctl restart wazuh-indexer
systemctl restart wazuh-manager


Creative Wolf (CreativeWolf)

unread,
10:40 AM (3 hours ago) 10:40 AM
to Wazuh | Mailing List
Hi Javier,

Thanks, I tried this and yet the listing of these vulnerabilities won't go and it keeps sullying the dashboard.

See attached screen grab - Please let me know if I can provide any other information, logs etc to further identify and resolve this issue.

Thanks

CreativeWolf

Wazuh-Package-Capture.PNG

Reply all
Reply to author
Forward
0 new messages